网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What are two benefits of control plane policing?()
- A、protection against denial of service (DoS) attacks at infrastructure routers and switches
- B、 protection against known worm attacks in routers and switches
- C、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switches
- D、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switches
- E、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
参考答案
更多 “What are two benefits of control plane policing?()A、protection against denial of service (DoS) attacks at infrastructure routers and switchesB、 protection against known worm attacks in routers and switchesC、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesD、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesE、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches” 相关考题
考题
Quality control charts show a characteristic of the product or service against:A . the specification limitsB . customer requirementsC . control limits based on three standard deviations in each directionD . control limits based on six standard deviations in each directionE . A and D only
考题
129 Quality control charts show a characteristic of the product or service against:A. the specification limits.B. customer requirements.C. control limits based on three standard deviations in each direction.D. control limits based on six standard deviations in each direction.E. A and D only
考题
175 Quality control charts show a characteristic of the product or service against:A. the specification limitsB. customer requirementsC. control limits based on three standard deviations in each directionD. control limits based on six standard deviations in each directionE. A and D only
考题
Which two types of attacks are considered to be denial of service?() (Choose two.)
A. zombie agentsB. SYN floodC. IP packet fragmentsD. WinNuke
考题
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)
A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router
考题
One possible benefit of the experiment discussed in the passage is__________.A.less crowded cities
B.victory over death
C.protection against fatal injury
D.fewer deaths from heart attacks
考题
There are different ways to perform IP based DoS Attacks. The most common IP based DoS attack is that an attacker sends an extensive amount of connection establishment( )(e.g. TCP SYN requests) to establish hanging connections with the controller or a DPS. Such a way, the attacker can consume the network resources which should be available for legitimate users. In other( ), the attacker inserts a large amount of( )packets to the data plane by spoofing all or part of the header fields with random values. These incoming packets will trigger table-misses and send lots of packet-in flow request messages to the network controller to saturate the controller resources. In some cases, an( )who gains access to DPS can artificially generate lots of random packet-in flow request messages to saturate the control channel and the controller resources. Moreover, the lack of diversity among DPSs fuels fuels the fast propagation of such attacks.Legacy?mobile backhaul devices are inherently protected against the propagation of attacks due to complex and vendor specific equipment. Moreover, legacy backhaul devices do not require frequent communication with core control devices in a manner similar to DPSs communicating with the centralized controller. These features minimize both the impact and propagation of DoS attacks. Moreover, the legacy backhaul devices are controlled as a joint effort of multiple network element. For instance, a single Long Term Evilution(LTE)eNodeB ?is connected up to 32 MMEs. Therefore, DoS/DDoS attack on a single core element will not terminate the entire operation of a backhaul device(请作答此空)the network.A. or
B. of
C. in
D .to
考题
Which of the following comparison of Control Plane Policing (CoPP) with Receive ACL(Racl) is correct?()A、CoPP protects against IP spoofing;Racl protects against DoS attacks.B、CoPP can not use named access lists;Racl can use named access listsC、CoPP applies to a dedicated control plane interface;Racl applies to all interfaces.D、CoPP needs a AAA server,Racl does not need a AAA serverE、CoPP supports rate limits;Racl does not support rate limits
考题
Which two Cisco router functional planes are protected by Control Plane Policing (COPP)?()A、data planeB、control planeC、service planeD、management planeE、hyper plane
考题
Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
考题
What are two ways to minimize the delay of VoIP packets that are traversing a network?()A、Use WFQ, CBWFO, and LLO to prioritize delay-sensitive packetsB、Use WFO, CBWFO, and LLO to compress the payload.C、Give TCP packets priority over UDP packets.D、Use control plane policing for cRTP queuing.E、Use stacker and predictor to compress the payload.
考题
Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()A、Control Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.B、Control Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.C、Control Plane Policing (CoPP) uses a dedicated "control-plane" command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.D、Control Plane Policing (CoPP) uses "service policy" command under relevant interfaces to filter DOS packet to protect routing packets.E、Control Plane Policing (CoPP) protects the transit management and data traffic through the router.
考题
The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()A、control plane policingB、data plane policingC、network-based application recognition (NBAR)D、service plane policingE、management plane policing
考题
Which statement is not a reason for an organization to incorporate a SAN in its enterprise infrastructure?()A、To decrease both capital and operating expenses associated with data storageB、To decrease the threat of viruses and worm attacks against data storage devicesC、To meet changing business priorities,applications,and revenue growthD、To increase the performance of long-distance replication,backup,and recovery
考题
What are three applications for firewall filters in JUNOS software?()A、route filteringB、protect the routing engineC、securing the router control planeD、protect against hidden bridge loopsE、protect against denial of service attacks
考题
What are two benefits of the Cisco 1800 Series Integrated Services Routers?()A、 fixed configuration for secure broadband, metro Ethernet, and wireless connectivityB、 configuration for security policy monitoringC、 dynamic management through self-healing processesD、 connectivity options and investment protection through support for existing Cisco 1700 SeriesWICs
考题
Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A、 Cisco Trust AgentB、 Cisco Self-Defending NetworkC、 Cisco Secure Access ControlD、 Cisco Network Admission Control
考题
What are three facts control plane policing? ()A、a set of rules that can be established and associated with the ingress and egress ports of the control planeB、improves performance of the control plane by marking control plane packets with DSCPEFC、protects the control plane on a router from DoS attacksD、treats the control plane as a separate entity with its own ingress (input) and egress (output) portsE、provides the control plane with a separate token bucketF、enhances security of the control plane by tunneling packets to and from the control plane
考题
Which Control Plane Policing (CoPP) statement is true?()A、 Traffic to be policed is identified using the control-plane global configuration command.B、 The control-plane global configuration command enters the Cisco Modular QoS CLI (MQC) mode.C、 The control-plane global configuration command enters the control-plane configuration mode. D、 Traffic to be policed is identified using the control-plane interface configuration command.E、 The control-plane interface configuration command enters the Cisco Modular QoS CLI (MQC) mode.F、 The control-plane interface configuration command enters the control-plane configuration mode.
考题
What are two ways to minimize the delay of VoIP packets that are traversing a network? ()A、 Use WFQ, CBWFQ, and LLQ to prioritize delay-sensitive packets.B、 Use WFQ, CBWFQ, and LLQ to compress the payload.C、 Give TCP packets priority over UDP packets.D、 Use control plane policing for cRTP queuing.E、 Use stacker and predictor to compress the payload.
考题
Which two types of attacks are considered to be denial of service?() (Choose two.)A、zombie agentsB、SYN floodC、IP packet fragmentsD、WinNuke
考题
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)A、rate limiting of ICMPB、RADIUS authorizationsC、source address validationD、stateful firewall on the router
考题
单选题Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A
Cisco Trust AgentB
Cisco Self-Defending NetworkC
Cisco Secure Access ControlD
Cisco Network Admission Control
考题
多选题What are three applications for firewall filters in JUNOS software?()Aroute filteringBprotect the routing engineCsecuring the router control planeDprotect against hidden bridge loopsEprotect against denial of service attacks
考题
多选题Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()AControl Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.BControl Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.CControl Plane Policing (CoPP) uses a dedicated control-plane command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.DControl Plane Policing (CoPP) uses service policy command under relevant interfaces to filter DOS packet to protect routing packets.EControl Plane Policing (CoPP) protects the transit management and data traffic through the router.
考题
多选题What are two benefits of control plane policing?()Aprotection against denial of service (DoS) attacks at infrastructure routers and switchesBprotection against known worm attacks in routers and switchesCquality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesDquality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesEquality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
考题
多选题Which two of these statements best describe the benefits of WPAv1? ()ASSID broadcast preventionBImproved mutual authenticationCImproved encryption through AESDImproved protection against sniffing initialization vectorsERF jamming prevention
热门标签
最新试卷