网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
In base e-Commerce module designs, where should firewall perimeters be placed? ()
A

 core layer

B

 Internet boundary

C

 aggregation layer

D

 aggregation and core layers

E

 access and aggregation layers


参考答案

参考解析
解析: 暂无解析
更多 “单选题In base e-Commerce module designs, where should firewall perimeters be placed? ()A  core layerB  Internet boundaryC  aggregation layerD  aggregation and core layersE  access and aggregation layers” 相关考题
考题 One should always _____ facts. A、base one's opinion onB、base one's opinion inC、base one opinion onD、base one opinion in

考题 Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()A.B.C.D.

考题 Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

考题 What is the purpose of unicast reverse path forwarding?() A. to validate packet receipt on interfaces where the traffic should be receivedB. to forward packets out the interfaces where the traffic should be receivedC. to forward packets out the interfaces where the traffic should be sentD. to validate packet receipt on interfaces where the traffic should be sent

考题 Where should you install the spare line module in a redundancy group?() A.last slot in the chassisB.first slot in the chassisC.lowest numbered slot in thegroupD.highest numbered slot in the group

考题 Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() A. FWSM routes traffic between the VLANs.B. FWSM switches traffic between the VLANs.C. Transparent mode is often called bump-in-the-wire mode.D. Transparent mode firewall deployments are used most often in current designs.E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.

考题 In a base e-Commerce module design, which routing statement is correct?() A. Routing is mostly static.B. Hardcoded IP addresses are used to support failover.C. Inbound servers use the CSM or ACE as the default gateway.D. VLANs between the access layer switches are used for FHRP protocols.

考题 In base e-Commerce module designs, where should firewall perimeters be placed?() A. core layerB. Internet boundaryC. aggregation layerD. aggregation and core layersE. access and aggregation layers

考题 When BGP tuning is used, how is packet flow into the e-commerce module controlled?()A、by tracking the status of objects along the path to the e-commerce moduleB、by detecting undesirable conditions along the path to the e-commerce moduleC、by using the MED to communicate the site preferences for traffic to multiple ISPsD、by communicating the available prefixes, routing policies, and preferences of each site to its ISPE、by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

考题 What is the logistics base module? ()A、1200*1000mmB、2591*2438mmC、600*400mmD、A, B and C

考题 You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON

考题 What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

考题 In a base e-Commerce module design, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

考题 In base e-Commerce module designs, where should firewall perimeters be placed? ()A、 core layerB、 Internet boundaryC、 aggregation layerD、 aggregation and core layersE、 access and aggregation layers

考题 A customer is considering an Intel processor-based blade solution from a competitor. The customer is willing to share only the information that the competitor offers 96 Xeon processors per rack.  Which of the following IBM BladeCenter E benefits should the Sales Specialist emphasize first?()A、Redundant BlowersB、Availability of AMD and Intel ProcessorsC、Processor densityD、Advanced Management Module

考题 What is the purpose of unicast reverse path forwarding?()A、to validate packet receipt on interfaces where the traffic should be receivedB、to forward packets out the interfaces where the traffic should be receivedC、to forward packets out the interfaces where the traffic should be sentD、to validate packet receipt on interfaces where the traffic should be sent

考题 Where is the IS-IS Network Entity Title configured?()A、per IP interfaceB、per virtual routerC、only on LAN interfacesD、only on WAN interfaces

考题 You write a procedure that will be called from two level triggers and a database trigger. Where should you store this code? ()A、On the Oracle server. B、Locally in each form module. C、In an attached PL/SQL library D、On your file network server.

考题 单选题What is a virtual firewall?()A another name for a firewall deployed in routed modeB another name for a firewall deployed in transparent modeC a separation of multiple firewall security contexts on a single firewallD a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

考题 单选题On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()A sshB connectC loginD session

考题 单选题When BGP tuning is used, how is packet flow into the e-commerce module controlled?()A by tracking the status of objects along the path to the e-commerce moduleB by detecting undesirable conditions along the path to the e-commerce moduleC by using the MED to communicate the site preferences for traffic to multiple ISPsD by communicating the available prefixes, routing policies, and preferences of each site to its ISPE by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

考题 单选题You write a procedure that will be called from two level triggers and a database trigger. Where should you store this code? ()A On the Oracle server. B Locally in each form module. C In an attached PL/SQL library D On your file network server.

考题 单选题Where should you install the spare line module in a redundancy group?()A last slot in the chassisB first slot in the chassisC lowest numbered slot in thegroupD highest numbered slot in the group

考题 单选题The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A  another name for a firewall deployed in routed modeB  another name for a firewall deployed in transparent modeC  a separation of multiple firewall security contexts on a single firewallD  a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

考题 单选题In base e-Commerce module designs, where should firewall perimeters be placed?()A core layerB Internet boundaryC aggregation layerD aggregation and core layersE access and aggregation layers

考题 单选题In a base e-Commerce module design, which routing statement is correct?()A  Routing is mostly static.B  Hardcoded IP addresses are used to support failover.C  Inbound servers use the CSM or ACE as the default gateway.D  VLANs between the access layer switches are used for FHRP protocols.

考题 单选题The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()A another name for a firewall deployed in routed modeB another name for a firewall deployed in transparent modeC a separation of multiple firewall security contexts on a single firewallD a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context