网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
A.ASM
B.BiDirPIM
C.PIM-SMRP
D.RP-Switchover
E.SourceSpecificMulticast
参考答案
更多 “ Which two of these multicast deployments are most susceptible to attacks from unknown sources?() A.ASMB.BiDirPIMC.PIM-SMRPD.RP-SwitchoverE.SourceSpecificMulticast ” 相关考题
考题
Most computer systems are(165)to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be(166)to an outsider attack by preventing(167)from outside can still be vulnerable to the insider attacks accomplished by abusive usage of(168)users. Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually(169)by tools referred to as Intrusion Detection Systems.A.vulnerableB.weekC.sensitivelyD.helpless
考题
Most computer systems are (71) to two different groups of attacks:insider attacks and outsider attacks.A system that is known to be (72) to an outsider attack by preventing(73) from outside can still be vulnerable to the insider attacks accomplished by abusive usage of (74) users.Detecting such abusive usage as well as attacks by outsides not only provides information on damage assessment,but also helps to prevent future attacks.These attacks are usually (75) by tools referred to as Intrusion Detection Systems.(77)A.vulnerableB.weekC.helplessD.sensitively
考题
Which two benefits does the Juniper DX provide?() (Choose two.)
A. It compresses all images.B. It protects servers from DDoS attacks.C. It protects servers from SynFlood attacks.D. It loads all content from web servers to flash.
考题
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)
A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router
考题
Which two multicast protocol statements are true?()
A. Sparse mode multicast uses a pull model to send multicast traffic to where it is requestedB. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted trafficC. Dense mode multicast requires explicit join messa ges from their membersD. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flowsE. The primary use of sparse mode multicast is for test labs and router performance testing
考题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()A、ASMB、BiDirPIMC、PIM-SMRPD、RP-SwitchoverE、SourceSpecificMulticast
考题
Which two statements are true about the rendezvous poin t (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution tree.B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).C、The multicast receivers must register with the RP to form the multicast distribution tree.D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).E、An RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.
考题
Apart from interdomain multicast routing, what else is MSDP used for?()A、Source Specific Multicast and IGMPv2B、Announcing multicast sources to BGP speakersC、Anycast RPD、Intradomain multicast routing
考题
Which two statements are tru e about the rendezvous point (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution treeB、An RP is required only in networks running Protocol Independent Multicast dense mode ( PIM DM)C、The multicast receivers must register with the RP to form the multicast distribution treeD、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM)E、An RP is required only in networks running Pro tocol Independent Multicast sparse - dense mode (PIM - SDM)F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP
考题
Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()A、jitterB、delayC、PoED、bandwidthE、packet loss
考题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()A、 ASMB、 BiDir PIMC、 PIM-SM RPD、 RP-SwitchoverE、 Source Specific Multicast
考题
Which two benefits does the Juniper DX provide?() (Choose two.)A、It compresses all images.B、It protects servers from DDoS attacks.C、It protects servers from SynFlood attacks.D、It loads all content from web servers to flash.
考题
Which two are characteristics of an IPv6 multicast address?()A、First (most significant ) octet is FF in hexB、Starts with a prefix of FE80 to FEBF in hexC、Starts with a prefix of FECO to FEFF in hexD、Second octet contains a 4-bit multicast scope fieldE、Last 64 bit contains the modified MAC address of the Ethernet interfaceF、Is allocated from the unicast address space
考题
Which two statements are true about the rendezvo us point (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution tree.B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).C、The mu lticast receivers must register with the RP to form the multicast distribution tree.D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).E、An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.
考题
Which of the following cables is the MOST susceptible to interference?()A、FiberB、CoaxC、UTPD、STP
考题
多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router
考题
多选题Which two types of attacks are considered to be denial of service?() (Choose two.)Azombie agentsBSYN floodCIP packet fragmentsDWinNuke
考题
多选题Which two of these multicast deployments are most susceptible to attacks from unknown sources?()AASMBBiDir PIMCPIM-SM RPDRP-SwitchoverESource Specific Multicast
考题
多选题Which two statements are true about the rendezvous poin t (RP) in a multicast network?()AThe multicast sources must register with the RP to form the multicast distribution tree.BAn RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).CThe multicast receivers must register with the RP to form the multicast distribution tree.DAn RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).EAn RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).FTo form the multicast distribution tree, the multicast sources register with and the receivers join the RP.
考题
多选题Which two of these multicast deployments are most susceptible to attacks from unknown sources?()AASMBBiDirPIMCPIM-SMRPDRP-SwitchoverESourceSpecificMulticast
考题
多选题Which two Cisco antennas provide better isolation from RF sources that might be located behindthe antennas?()AAIR-ANT3213BAIR-ANT2465P-RCAIR-ANT1949DAIR-ANT5160V-R
考题
多选题Which two benefits does the Juniper DX provide?() (Choose two.)AIt compresses all images.BIt protects servers from DDoS attacks.CIt protects servers from SynFlood attacks.DIt loads all content from web servers to flash.
考题
多选题Which two statements are true about the rendezvo us point (RP) in a multicast network?()AThe multicast sources must register with the RP to form the multicast distribution tree.BAn RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).CThe mu lticast receivers must register with the RP to form the multicast distribution tree.DAn RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).EAn RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).FTo form the multicast distribution tree, the multicast sources register with and the receivers join the RP.
考题
多选题In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()AIt is used for PIM control trafficBIt is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routersCWithin the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sourcesDThere is a reduced multicast state in the MPLS core P routersEWhen multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth
考题
多选题Which two multicast protocol statements are true? (Choose two.) ()ADense mode multicast requires explicit join messages from their members.BDense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic.CSparse mode multicast uses a pull model to send multicast traffic to where it is requested.DSparse mode uses reverse path forwarding (RPF) to prune off redundant flows.EThe primary use of sparse mode multicast is for test labs and router performance testing.
考题
多选题Which two multicast protocol statements are true?()ASparse mode multicast uses a pull model to send multicast traffic to where it is requestedBDense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted trafficCDense mode multicast requires explicit join messa ges from their membersDSparse mode uses reverse path forwarding (RPF) to prune off redundant flowsEThe primary use of sparse mode multicast is for test labs and router performance testing
考题
多选题Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()AjitterBdelayCPoEDbandwidthEpacket loss
热门标签
最新试卷