网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
What is meant by the term "firewall sandwich"?()
A
multiple layers of firewalling
B
a method of operating firewalls from multiple vendors
C
firewall connections in either an active or standby state
D
an architecture in which all traffic between firewalls goes through application-specific servers
E
an architecture in which all traffic between firewalls goes through application-specific gateways
参考答案
参考解析
解析:
暂无解析
更多 “单选题What is meant by the term "firewall sandwich"?()A multiple layers of firewallingB a method of operating firewalls from multiple vendorsC firewall connections in either an active or standby stateD an architecture in which all traffic between firewalls goes through application-specific serversE an architecture in which all traffic between firewalls goes through application-specific gateways” 相关考题
考题
Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations.What should you do?()A. Configure dynamic NAT on the firewall.B. Configure the firewall to allow the use of Teredo.C. Configure a link local IPv6 address for the internal interface of the firewall.D. Configure a global IPv6 address for the external interface of the firewall.
考题
Basically, a firewall is a(145)process or a set of integrated processes that runs on a router or(146)to control the flow of networked application traffic(147)through it. Typically, firewalls are placed on the entry point to a(148)network such as the Internet. They could be considered traffic cops. The firewall's(149)is to ensure that all communication between an organization's network and the Internet conform. to the organization's policies.A.dependentB.isolatedC.relatedD.standalone
考题
Basically, a(71)is a standalone process or a set of integrated processes that runs on a router or server to control the flow of(72)application traffic(73)through it. Typically, firewalls are(74)on the entry point to a public network such as the Internet. They could be considered traffic cops. The firewall' s(75)is to ensure that all communication between an organization's network and the Internet conform. to the organization's security policies.A.routerB.clientC.firewallD.switch
考题
Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?()
A. Proper placement depends on the VLAN assignment.B. Place it outside the firewall.C. Place it inside the firewall to make design and management easier.D. Place it inside the firewall with multiple context modes connecting to all configured contexts.
考题
Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.
考题
It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A、 single layer of firewallingB、 multiple layers of firewallingC、 firewall connections in either an active or standby stateD、 an architecture in which all traffic between firewalls goes through application-specific servers
考题
What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways
考题
Which two statements are true about firewall filter configurations?()A、Multiple action modifiers can be included in the same term.B、Only a single action modifier can be included in the same term.C、The default term within a firewall filter uses the discard action.D、The default term within a firewall filter uses the reject action.
考题
Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008.You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in,disable the IP Helper.B、From the Services snap-in,disable the Netlogon service.C、From Windows Firewall,enable the Block all connections option on the Public Profile.D、From Windows Firewall enable the Block all connections option on the Domain Profile.
考题
What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
考题
Which of the following is the BEST reason to implement a firewall on a server?()A、To watch for bandwidth issuesB、To protect the server from all trafficC、To block certain traffic by portsD、To monitor certain malicious traffic
考题
While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls. What must be considered about HACMP in a firewall environment?() A、 Firewalls are not supported in a HACMP environment.B、 HACMP uses only TCP/IP so firewalls are not relevant.C、 Specific ports must be open for HACMP communications.D、 Dynamic routing must be used to properly route packets in a firewall-protected environment.
考题
You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A、 From Windows Firewall, add an exceptionB、 From windows Firewall enable the block all incoming connections optionC、 From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD、 From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
考题
Your network contains one Active Directory domain. You have a member server that runs Windows Server 2008 R2.You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in, disable the IP Helper.B、From the Services snap-in, disable the Netlogon service.C、From Windows Firewall, enable the Block all connections option on the Public Profile.D、From Windows Firewall, enable the Block all connections option on the Domain Profile.
考题
Your network contains one Active Directory domainl. You have a member server that runs Windows Server 2008. You need to immediately disable all incoming connections to the server. What should you do?()A、From the Services snap-in disable the IP HelpderB、Fom the Services snap-in disable the Net Logon ServiceC、From Windows Firewall, enable the Block all connections option on the Public ProfileD、From the Windows Firewall, enable the Block all connections option on the Domain Profile
考题
You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
考题
Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?()A、Configure dynamic NAT on the firewall.B、Configure the firewall to allow the use of Teredo.C、Configure a link local IPv6 address for the internal interface of the firewall.D、Configure a global IPv6 address for the external interface of the firewall.
考题
单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A
single layer of firewallingB
multiple layers of firewallingC
firewall connections in either an active or standby stateD
an architecture in which all traffic between firewalls goes through application-specific servers
考题
单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B
Allow all inbound VPN traffic to pass through the perimeter firewall only. C
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
考题
单选题While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls. What must be considered about HACMP in a firewall environment?()A
Firewalls are not supported in a HACMP environment.B
HACMP uses only TCP/IP so firewalls are not relevant.C
Specific ports must be open for HACMP communications.D
Dynamic routing must be used to properly route packets in a firewall-protected environment.
考题
单选题You have a server that runs Windows Server 2008. You need to prevent the server from establishing communication sessions to other computers by using TCP port 25. What should you do()A
From Windows Firewall, add an exceptionB
From windows Firewall enable the block all incoming connections optionC
From the Windows Firewall with Advanced Security snap-in, create an inbound ruleD
From the Windows Firewall with Advanced Security snap-in, create an outbound rule.
考题
单选题Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A
Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B
“East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C
Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D
Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.
考题
单选题Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do?()A
Configure dynamic NAT on the firewall.B
Configure the firewall to allow the use of Teredo.C
Configure a link local IPv6 address for the internal interface of the firewall.D
Configure a global IPv6 address for the external interface of the firewall.
考题
单选题You are designing a strategy to allow users to gain VPN access to the internal network. What should you do?()A
Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B
Allow all inbound VPN traffic to pass through the perimeter firewall only.C
Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D
Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.
考题
单选题Your company has computers in multiple locations that use IPv4 and IPv6. Each location is protected by a firewall that performs symmetric NAT. You need to allow peer-to-peer communication between all locations. What should you do? ()A
Configure dynamic NAT on the firewallB
Configure the firewall to allow the use of TeredoC
Configure a link local IPv6 address for the internal interface of the firewallD
Configure a global IPv6 address for the external interface of the firewall
考题
单选题What is a virtual firewall?()A
another name for a firewall deployed in routed modeB
another name for a firewall deployed in transparent modeC
a separation of multiple firewall security contexts on a single firewallD
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE
a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
考题
单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2).A firewall separates the internal network from the Internet. The firewall blocks all outbound traffic except for HTTP and SMTP traffic.You install a DNS server. The DNS server is configured to use the default root hints. You need to ensure that the DNS server can resolve the host names on the Internet. Which port should you open on the firewall?()A
53B
135C
500D
3389
热门标签
最新试卷