网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What are two reasons that a network administrator would use access lists (Choose two.)()。
A.to control vty access into a router
B.to control broadcast traffic through a router
C.to filter traffic as it passes through a router
D.to filter traffic that originates from the router
E.to replace passwords as a line of defense against security incursions
参考答案
更多 “ What are two reasons that a network administrator would use access lists (Choose two.)()。 A.to control vty access into a routerB.to control broadcast traffic through a routerC.to filter traffic as it passes through a routerD.to filter traffic that originates from the routerE.to replace passwords as a line of defense against security incursions ” 相关考题
考题
CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages
考题
Click the Exhibit button.What are two valid reasons for the output shown in the exhibit?() (Choose two.)
A. The local Web-filtering daemon is not enabled or is not running.B. The integrated Web-filtering policy server is not reachable.C. No DNS is configured on the SRX Series device.D. No security policy is configured to use Web filtering.
考题
Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
A. protocol listB. MIMEC. block listD. extension
考题
What are two ways to view the system log files on a WX device? ()(Choose two.)
A. Use the CLI and enter show log.B. Use the CLI and enter show all.C. Use the CLI and enter show logging.D. In WebView, choose Admin Tools Display System Log.
考题
What are two reasons a network administrator would use CDP?()
A. to verify the type of cable interconnecting two devicesB. to determine the status of network services on a remote deviceC. to obtain VLAN information from directly connected switchesD. to verify Layer 2 connectivity between two devices when Layer 3 failsE. to obtain the IP address of a connected device in order to telnet to the deviceF. to determine the status of the routing protocols between directly connected routers
考题
What functions do routers perform in a network (Choose two.)()。
A.packet switchingB.access layer securityC.path selectionD.VLAN membership assignmentE.bridging between LAN segmentsF.microsegmentation of broadcast domai
考题
What are two security appliances that can be installed in a network (Choose two.)()。
A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM
考题
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption
考题
For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。
A.IPB.ICMPC.TCPD.UDP
考题
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption
考题
What functions do routers perform in a network (Choose two.)()。A、packet switchingB、access layer securityC、path selectionD、VLAN membership assignmentE、bridging between LAN segmentsF、microsegmentation of broadcast domai
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions
考题
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption.
考题
What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router B、to control broadcast traffic through a router C、to filter traffic as it passes through a router D、to filter traffic that originates from the router E、to replace passwords as a line of defense against security incursions
考题
What are two security appliances that can be installed in a network? (Choose two.)() A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM
考题
What are two reasons a network administrator would use CDP (Choose two.)()。A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers
考题
What are two reasons a network administrator would use CDP?()A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers
考题
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)A、cost savingsB、product varietyC、well-tested interoperabilityD、regular upgrade process
考题
Which of the following scenarios would dictate the use of a 64-bit processor instead of a 32-bit processor?()A、Implementation of access control lists (ACLs)B、Implementation of more than two network cardsC、Implementation of iSCSI attached storageD、Implementation of more than 4GB of RAM
考题
A network administrator receives complaints from the engineering group that an application on one server is not working properly. After further investigation, the administrator determines that source NAT translation is using a different source address after a random number of flows. Which two actions can the administrator take to force the server to use one address?() (Choose two.)A、Use the custom application feature.B、Configure static NAT for the host.C、Use port address translation (PAT).D、Use the address-persistent option.
考题
What are two ways to view the system log files on a WX device? ()(Choose two.)A、Use the CLI and enter show log.B、Use the CLI and enter show all.C、Use the CLI and enter show logging.D、In WebView, choose Admin Tools Display System Log.
考题
多选题Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)Aprotocol listBMIMECblock listDextension
考题
多选题What are two reasons a network administrator would use CDP? ()Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers
考题
多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption
考题
多选题What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()AAllow unrestricted access to the console or VTY ports.BUse a firewall to restrict access from the outside to the network devices.CAlways use Telnet to access the device command line because its data is automatically encrypted.DUse SSH or another encrypted and authenticated transport to access device configurations.EPrevent the loss of passwords by disabling password encryption.
考题
单选题For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()A
IPB
ICMPC
TCPD
UDP
考题
多选题What are two reasons a network administrator would use CDP (Choose two.)()。Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers
考题
多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM
热门标签
最新试卷