网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What are three benefits of using chassis clustering?()
A
Provides stateful session failover for sessions.
B
Increases security capabilities for IPsec sessions.
C
Provides active-passive control and data plane redundancy.
D
Enables automated fast-reroute capabilities.
E
Synchronizes configuration files and session state
参考答案
参考解析
解析:
暂无解析
更多 “多选题What are three benefits of using chassis clustering?()AProvides stateful session failover for sessions.BIncreases security capabilities for IPsec sessions.CProvides active-passive control and data plane redundancy.DEnables automated fast-reroute capabilities.ESynchronizes configuration files and session state” 相关考题
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)
A. data integrityB. data confidentialityC. data authenticationD. outer IP header confidentialityE. outer IP header authentication
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.
A.network
B.transport
C.application
D.session
考题
Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?()A、The session ID is a 32-bit locally significant field used to identify the call on the destination or egresstunnel endport. The session ID will be negotiated by the control connection or statically defined if usingthe L2TP v3 data plane onlyB、The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The controlconnection can negotiate this as an additional level of guarantee beyond the regular session ID lookupto make sure that a data message has been directed to the correct session or that any recently reusedsession ID will not be misdirectedC、The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnelendpoint. The cookie will be negotiated by the control connection or statically defined if using theL2TPv3 data plane onlyD、The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field the control connection can negotiate this as an additional level of guarantee beyond the regular cookielookup to make sure that a data message has been directed to the correct session or that any recentlyreused cookie will not be misdirected.
考题
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet borderrouter?()A、LDAPB、ICMPC、RTPD、BGPE、SSHF、RDP
考题
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()A、LDAPB、ICMPC、RTPD、BGPE、SSHF、RDP
考题
What are two benefits of control plane policing?()A、protection against denial of service (DoS) attacks at infrastructure routers and switchesB、 protection against known worm attacks in routers and switchesC、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesD、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesE、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
考题
Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three ofthese belong to the data plane?()A、XMLB、RIBC、FIBD、QoSE、PFI
考题
What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksB、 automatic reconfiguration s of the security devices based on current security threatsC、 containment and control of security threatsD、 application securityE、 anti-x defense F- virtual firewall
考题
What are three facts control plane policing? ()A、a set of rules that can be established and associated with the ingress and egress ports of the control planeB、improves performance of the control plane by marking control plane packets with DSCPEFC、protects the control plane on a router from DoS attacksD、treats the control plane as a separate entity with its own ingress (input) and egress (output) portsE、provides the control plane with a separate token bucketF、enhances security of the control plane by tunneling packets to and from the control plane
考题
What are three benefits of using chassis clustering?()A、Provides stateful session failover for sessions.B、Increases security capabilities for IPsec sessions.C、Provides active-passive control and data plane redundancy.D、Enables automated fast-reroute capabilities.E、Synchronizes configuration files and session state
考题
What are three benefits of IF-MAP Federation?()A、Enables seamless access for remote access users to firewall enforcer protected resources.B、Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.C、Enables dynamic configuration synchronization across multiple MAG Series devices.D、Provides a substitute for WAN clustering among geographically separated MAG Series devices.E、Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()A、data integrityB、data confidentialityC、data authenticationD、outer IP header confidentialityE、outer IP header authentication
考题
Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()A、MPLS LSPB、ATM tunnelC、GRE tunnelD、IPSEC tunnelE、L2TPv3 session
考题
What are three benefits of using ASM?() A、 Ease of disk administration and maintenanceB、 Load balancing across physical disksC、 Software RAID-1 data redundancy with double or triple mirrorsD、 Automatic recovery of failed disks
考题
多选题What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()Ausing QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksBautomatic reconfiguration s of the security devices based on current security threatsCcontainment and control of security threatsDapplication securityEanti-x defense F- virtual firewall
考题
多选题Which three protocols should be explicitly managed by using Control Plane Policing on an Internet borderrouter?()ALDAPBICMPCRTPDBGPESSHFRDP
考题
多选题What are three benefits of using ASM?()AEase of disk administration and maintenanceBLoad balancing across physical disksCSoftware RAID-1 data redundancy with double or triple mirrorsDAutomatic recovery of failed disks
考题
多选题What are three benefits of IF-MAP Federation?()AEnables seamless access for remote access users to firewall enforcer protected resources.BScales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.CEnables dynamic configuration synchronization across multiple MAG Series devices.DProvides a substitute for WAN clustering among geographically separated MAG Series devices.EShares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.
考题
多选题Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()ALDAPBICMPCRTPDBGPESSHFRDP
考题
多选题What are three facts control plane policing? ()Aa set of rules that can be established and associated with the ingress and egress ports of the control planeBimproves performance of the control plane by marking control plane packets with DSCPEFCprotects the control plane on a router from DoS attacksDtreats the control plane as a separate entity with its own ingress (input) and egress (output) portsEprovides the control plane with a separate token bucketFenhances security of the control plane by tunneling packets to and from the control plane
考题
多选题What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()Aprovides advanced security such as hardware encryption accelerationBprovides investment protection through increased modularityCcomes equipped with at least one 1000-based TX interlaceDcontains integrated wireless access using the 802.11 g/b standardEcontains integrated web-based management tools for easy configuration and maintenance
考题
多选题What are two benefits of control plane policing?()Aprotection against denial of service (DoS) attacks at infrastructure routers and switchesBprotection against known worm attacks in routers and switchesCquality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesDquality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesEquality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
考题
多选题Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three ofthese belong to the data plane?()AXMLBRIBCFIBDQoSEPFI
考题
多选题Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? ()APW capabilities listBMessage typeCAssigned control connection IDDPW typeERemote session IDFHostname
考题
多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.
考题
多选题Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?()AThe session ID is a 32-bit locally significant field used to identify the call on the destination or egresstunnel endport. The session ID will be negotiated by the control connection or statically defined if usingthe L2TP v3 data plane onlyBThe cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The controlconnection can negotiate this as an additional level of guarantee beyond the regular session ID lookupto make sure that a data message has been directed to the correct session or that any recently reusedsession ID will not be misdirectedCThe cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnelendpoint. The cookie will be negotiated by the control connection or statically defined if using theL2TPv3 data plane onlyDThe session ID is a variable length(with a maximum of eight bytes),word-aligned optional field the control connection can negotiate this as an additional level of guarantee beyond the regular cookielookup to make sure that a data message has been directed to the correct session or that any recentlyreused cookie will not be misdirected.
热门标签
最新试卷