网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A.ASM

B.BiDirPIM

C.PIM-SMRP

D.RP-Switchover

E.SourceSpecificMulticast


参考答案

更多 “ Which two of these multicast deployments are most susceptible to attacks from unknown sources?() A.ASMB.BiDirPIMC.PIM-SMRPD.RP-SwitchoverE.SourceSpecificMulticast ” 相关考题
考题 Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(166)to an outsider attack by preventing(167)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(168)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(169)by tools referred to as Intrusion Detection Systems.A.vulnerableB.weekC.sensitivelyD.helpless

考题 Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsider attack by preventing(73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users.Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment,but also helps to prevent future attacks.These attacks are usually (75) by tools referred to as Intrusion Detection Systems.(77)A.vulnerableB.weekC.helplessD.sensitively

考题 Which two benefits does the Juniper DX provide?() (Choose two.) A. It compresses all images.B. It protects servers from DDoS attacks.C. It protects servers from SynFlood attacks.D. It loads all content from web servers to flash.

考题 Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.) A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router

考题 Which two multicast protocol statements are true?() A. Sparse mode multicast uses a pull model to send multicast traffic to where it is requestedB. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted trafficC. Dense mode multicast requires explicit join messa ges from their membersD. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flowsE. The primary use of sparse mode multicast is for test labs and router performance testing

考题 Which two of these multicast deployments are most susceptible to attacks from unknown sources?()A、ASMB、BiDirPIMC、PIM-SMRPD、RP-SwitchoverE、SourceSpecificMulticast

考题 Which two statements are true about the rendezvous poin t (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution tree.B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).C、The multicast receivers must register with the RP to form the multicast distribution tree.D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).E、An RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 Apart from interdomain multicast routing, what else is MSDP used for?()A、Source Specific Multicast and IGMPv2B、Announcing multicast sources to BGP speakersC、Anycast RPD、Intradomain multicast routing

考题 Which two statements are tru e about the rendezvous point (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution treeB、An RP is required only in networks running Protocol Independent Multicast dense mode ( PIM DM)C、The multicast receivers must register with the RP to form the multicast distribution treeD、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM)E、An RP is required only in networks running Pro tocol Independent Multicast sparse - dense mode (PIM - SDM)F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP

考题 Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()A、jitterB、delayC、PoED、bandwidthE、packet loss

考题 Which two of these multicast deployments are most susceptible to attacks from unknown sources?()A、 ASMB、 BiDir PIMC、 PIM-SM RPD、 RP-SwitchoverE、 Source Specific Multicast

考题 Which two benefits does the Juniper DX provide?() (Choose two.)A、It compresses all images.B、It protects servers from DDoS attacks.C、It protects servers from SynFlood attacks.D、It loads all content from web servers to flash.

考题 Which two are characteristics of an IPv6 multicast address?()A、First (most significant ) octet is FF in hexB、Starts with a prefix of FE80 to FEBF in hexC、Starts with a prefix of FECO to FEFF in hexD、Second octet contains a 4-bit multicast scope fieldE、Last 64 bit contains the modified MAC address of the Ethernet interfaceF、Is allocated from the unicast address space

考题 Which two statements are true about the rendezvo us point (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution tree.B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).C、The mu lticast receivers must register with the RP to form the multicast distribution tree.D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).E、An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 Which of the following cables is the MOST susceptible to interference?()A、FiberB、CoaxC、UTPD、STP

考题 多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router

考题 多选题Which two types of attacks are considered to be denial of service?() (Choose two.)Azombie agentsBSYN floodCIP packet fragmentsDWinNuke

考题 多选题Which two of these multicast deployments are most susceptible to attacks from unknown sources?()AASMBBiDir PIMCPIM-SM RPDRP-SwitchoverESource Specific Multicast

考题 多选题Which two statements are true about the rendezvous poin t (RP) in a multicast network?()AThe multicast sources must register with the RP to form the multicast distribution tree.BAn RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).CThe multicast receivers must register with the RP to form the multicast distribution tree.DAn RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).EAn RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).FTo form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 多选题Which two of these multicast deployments are most susceptible to attacks from unknown sources?()AASMBBiDirPIMCPIM-SMRPDRP-SwitchoverESourceSpecificMulticast

考题 多选题Which two Cisco antennas provide better isolation from RF sources that might be located behindthe antennas?()AAIR-ANT3213BAIR-ANT2465P-RCAIR-ANT1949DAIR-ANT5160V-R

考题 多选题Which two benefits does the Juniper DX provide?() (Choose two.)AIt compresses all images.BIt protects servers from DDoS attacks.CIt protects servers from SynFlood attacks.DIt loads all content from web servers to flash.

考题 多选题Which two statements are true about the rendezvo us point (RP) in a multicast network?()AThe multicast sources must register with the RP to form the multicast distribution tree.BAn RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).CThe mu lticast receivers must register with the RP to form the multicast distribution tree.DAn RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).EAn RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).FTo form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 多选题In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()AIt is used for PIM control trafficBIt is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routersCWithin the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sourcesDThere is a reduced multicast state in the MPLS core P routersEWhen multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth

考题 多选题Which two multicast protocol statements are true? (Choose two.)  ()ADense mode multicast requires explicit join messages from their members.BDense mode multicast uses a push model to flood traffic throughout the network and then prunes the  unwanted traffic.CSparse mode multicast uses a pull model to send multicast traffic to where it is requested.DSparse mode uses reverse path forwarding (RPF) to prune off redundant flows.EThe primary use of sparse mode multicast is for test labs and router performance testing.

考题 多选题Which two multicast protocol statements are true?()ASparse mode multicast uses a pull model to send multicast traffic to where it is requestedBDense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted trafficCDense mode multicast requires explicit join messa ges from their membersDSparse mode uses reverse path forwarding (RPF) to prune off redundant flowsEThe primary use of sparse mode multicast is for test labs and router performance testing

考题 多选题Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()AjitterBdelayCPoEDbandwidthEpacket loss