网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many flows exist between Host A and Host B? ()
- A、1
- B、2
- C、3
- D、4
参考答案
更多 “ Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many flows exist between Host A and Host B? ()A、1B、2C、3D、4” 相关考题
考题
What time does the office open()?
A.1 think it opens at 8B It opens on MondayC. It closes at 8
考题
Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections.How many sessions exist between Host A and Host B?()A.1B.2C.3D.4
考题
A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back.What is causing the problem?()A. The host needs to open the telnet port.B. The host needs a route for the translated address.C. The administrator must use a proxy-arp policy for the translated address.D. The administrator must use a security policy, which will allow communication between the zones.
考题
You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()
A. Telnet is not being permitted by self policy.B. Telnet is not being permitted by security policy.C. Telnet is not allowed because it is not considered secure.D. Telnet is not enabled as a host-inbound service on the zone.
考题
Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()
A. DNS traffic is denied.B. Telnet traffic is denied.C. SMTP traffic is denied.D. Ping traffic is permitted.
考题
A Telnet session is initiated from host 10.1.1.1. What will happen when it is processed by the firewall filter shown in the exhibit?()
A. The packet will be accepted and logged.B. The packet will be discarded and logged.C. The packet will be rejected and a syslog message generated.D. The packet will be accepted and sampled.
考题
What are two examples of RE exception traffic?()
A. BGP updates that travel through the local router and are destined for a remote router.B. OSPF hello packets that are sent from a remote router and are destined for the local router.C. Telnet traffic that is sent from a remote host and is destined for the local router.D. Telnet traffic that travels through the local router and is destined for a remote end host.
考题
You‘re the systems administrator at Testing, and you create the following access control lists.You then enter the command ip access-group 101 in to apply access control list 101 to router TK1s e0 interface.Which of the following Telnet sessions will be blocked as a result of your access lists?()A. Telnet sessions from host A to host 5.1.1.10B. Telnet sessions from host A to host 5.1.3.10C. Telnet sessions from host B to host 5.1.2.10D. Telnet sessions from host B to host 5.1.3.8E. Telnet sessions from host C to host 5.1.3.10F. Telnet sessions from host F to host 5.1.1.10
考题
Which command can be a router to verify the layer 3 path to a host?()
A. traceroute addressB. tracert addressC. ssh addressD. telnet address
考题
Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrators attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A.Host B and the switch need to be in the same subnet.B.The switch needs and appropriate default gateway assigned.C.The switch interface connected to the router is down.D.Host B need to be assigned an IP address in vlan 1.E.The switch interfaces need the appropriate IP addresses assigned.
考题
The access control list shown in the graphic has been applied to the Ethernet interface of router R1using the ip access-group 101 in command.Which of the following Telnet sessions will be blocked by this ACL?()A.from host PC1 to host 5.1.1.10B.from host PC1 to host 5.1.3.10C.from host PC2 to host 5.1.2.10D.from host PC2 to host 5.1.3.8
考题
Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A、 The FTP server sends back an acknowledgment (ACK) to the clientB、 The FTP server allocates a port touse for the data channel and transmit that port number to the clientC、 The FTP server opens the data channel to the client using the port number indicated by the clientD、 The FTP client opens the data channel to the FTP server on Port 20E、 The FTP client opens the datachannel to the FTP server on Port 21
考题
You are not able to telnet to the interface IP of your JUNOS software with enhanced services devicefrom a PC on the same subnet. What is causing the problem? ()A、Telnet is not being permitted by self policy.B、Telnet is not being permitted by security policy.C、Telnet is not allowed because it is not considered secure.D、Telnet is not enabled as a host-inbound service on the zone.
考题
Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are getting the following error message: telnet: connect: A remote host refused an attempted connect operation Which of the following could be the cause of this problem?()A、The routing table on the AIX server is incorrect.B、The IP address on the network adapter is incorrect.C、The portmap daemon is not running on the AIX server.D、The inetd daemon is not running on the AIX server.
考题
Which command can be a router to verify the layer 3 path to a host?()A、traceroute addressB、tracert addressC、ssh addressD、telnet address
考题
What are two examples of RE exception traffic?()A、BGP updates that travel through the local router and are destined for a remote router.B、OSPF hello packets that are sent from a remote router and are destined for the local router.C、Telnet traffic that is sent from a remote host and is destined for the local router.D、Telnet traffic that travels through the local router and is destined for a remote end host.
考题
You are not able to telnet to the interface IP address of your device from a PC on the same subnet. What iscausing the problem?()A、Telnet is not being permitted by self policy.B、Telnet is not being permitted by security policy.C、Telnet is not allowed because it is not considered secure.D、Telnet is not enabled as a host-inbound service on the zone
考题
Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.A、DNS traffic is denied.B、Telnet traffic is denied.C、SMTP traffic is denied.D、Ping traffic is permitted
考题
Your company runs Remote Desktop Services. You have a Remote Desktop Session Host (RD Session Host) se rver. You enable Microsoft Word as a RemoteApp application on the RD Session Host server. You need to ensure that the RemoteApp application opens when a user double - clicks a Word (.docx) file on a client computer. Which two actions should you perform?()A、Create a Windows Installer (.msi) file.B、Create a Remote Desktop Protocol (.rdp) file.C、In the properties of the RemoteApp application, enable the Allow any command - line arguments setting.D、Enable the Associate client extensions for this program with the RemoteApp program setting for the file.
考题
Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are getting the following error message: telnet: connect: A remote host refused an attempted connect operation Which of the following options could be the cause of this problem()A、The routing table on the AIX server is incorrect.B、The IP address in the /etc/hosts file is incorrect,C、The portmap daemon is not running on the AIX server.D、The inetd daemon is not running on the AIX server.
考题
单选题Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.A
DNS traffic is denied.B
Telnet traffic is denied.C
SMTP traffic is denied.D
Ping traffic is permitted
考题
单选题Refer to the exhibit.The network administrator normally establishes a telnet session with the switch from host A.However,host A is unavailable.The administrator′s attempt to the switch from host B fails,but pings to the other two hosts are successful.what is the issue?()A
Host B and the switch need to be in the same subnet.B
The switch needs and appropriate default gateway assigned.C
The switch interface connected to the router is down.D
Host B need to be assigned an IP address in vlan 1.E
The switch interfaces need the appropriate IP addresses assigned.
考题
单选题A network administrator has configured source NAT, translating to an address that is on a locally connected subnet.The administrator sees the translation working, but traffic does not appear to come back. What is causing the problem?()A
The host needs to open the telnet port.B
The host needs a route for the translated address.C
The administrator must use a proxy-arp policy for the translated address.D
The administrator must use a security policy, which will allow communication between the zones.
考题
单选题Multiple users are trying to telnet to the AIX server. They are able to ping the server successfully, but are getting the following error message: telnet: connect: A remote host refused an attempted connect operation Which of the following options could be the cause of this problem()A
The routing table on the AIX server is incorrect.B
The IP address in the /etc/hosts file is incorrect,C
The portmap daemon is not running on the AIX server.D
The inetd daemon is not running on the AIX server.
考题
单选题Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()A
The FTP server sends back an acknowledgment (ACK) to the clientB
The FTP server allocates a port touse for the data channel and transmit that port number to the clientC
The FTP server opens the data channel to the client using the port number indicated by the clientD
The FTP client opens the data channel to the FTP server on Port 20E
The FTP client opens the datachannel to the FTP server on Port 21
考题
单选题Host A opens a Telnet connection to Host B. Host A then opens another Telnet connection to Host B. These connections are the only communication between Host A and Host B. The security policy configuration permits both connections. How many sessions exist between Host A and Host B?()A
1B
2C
3D
4
考题
单选题以下哪项动作不会发起RRC CoNNeCtio NRequeSt()A
注册B
起呼C
切换D
关机
热门标签
最新试卷