网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()
A
Filter Smurf ICMP packets.
B
Filter as close to the core as possible
C
Filter as close to the edge as possible
D
Filter as precisely as possible
E
Filter both source and destination where possible
参考答案
参考解析
解析:
暂无解析
更多 “多选题What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()AFilter Smurf ICMP packets.BFilter as close to the core as possibleCFilter as close to the edge as possibleDFilter as precisely as possibleEFilter both source and destination where possible” 相关考题
考题
WhatareBCP38(BestCommonPractices38)/RFC2827IngressPacketFilteringPrinciples?()
A.FilterSmurfICMPpackets.B.FilterasclosetothecoreaspossibleC.FilterasclosetotheedgeaspossibleD.FilteraspreciselyaspossibleE.Filterbothsourceanddestinationwherepossible
考题
BCP(BestCommonPractices)38/RFC2827IngressandEgressPacketFilteringwouldhelpmitigatewhatclassificationofattack?()
A.SniffingattackB.DenialofserviceattackC.PortScanattackD.ReconnaisanceattackE.Spoofingattack
考题
WhenimplementingbestpracticesforIPSourceAddressSpoofingandDefeatingDenialofServiceAttackswithIPSourceAddressSpoofing,whatRFCiscommonlyusedtoprotectyournetwork?()
A.RFC1149B.RFC3704C.RFC1918D.RFC2827
考题
Whichis abenefitofimplementing RFC2827?()
A.PreventsDoSfromlegimate,non-hostileendsystemsB.Preventsdisruptionofspecialservices,suchasMobileIPC.DefeatsDoSAttackswhichemployIPSourceAddressSpoofingD.RestrictsdirectedbroadcastsattheingressrouterE.AllowsDHCPorBOOTPpacketstoreachtherelayagentsasappropriate
考题
When inspecting a tank barge to see that it has all the required fire extinguishers and other safety items aboard,which of the following is the best source for determining what is required?A.The supervisor in charge of the dock to which the barge is tied upB.Part 38 of the Rules and Regulations for Tank VesselsC.The Certificate of Inspection of the bargeD.The local fire marshal
考题
Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices
考题
You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()A、Get-EventLogLevelB、Get-ExchangeServerC、Exchange Best Practices AnalyzerD、Microsoft Baseline Security Analyzer (MBSA)
考题
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827
考题
With MPLS Fast Reroute, what is the "point of local repair"?()A、egress routerB、ingress routerC、start of the bypass tunnelD、all routers in the bypass tunnel
考题
What is the most common value of the hysteresis used when estimating margins for log-normal fading? ()A、3dBB、35dBC、36dBD、38dBE、20dB
考题
What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()A、Filter Smurf ICMP packets.B、Filter as close to the core as possibleC、Filter as close to the edge as possibleD、Filter as precisely as possibleE、Filter both source and destination where possible
考题
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack
考题
Which is a benefit of implementing RFC 2827?()A、Prevents DoS from legimate, non-hostile end systemsB、Prevents disruption of "special services", such as Mobile IPC、Defeats DoS Attacks which employ IPSource Address SpoofingD、Restricts directed broadcasts at the ingress routerE、Allows DHCP or BOOTP packets to reach the relay agents asappropriate
考题
Which firewall best practices can help mitigate worm and other automated attacks?()A、Segment security zonesB、Restrict access to firewallsC、Use logs and alertsD、Set connection limits
考题
What is the optimize timer on an RSVP-signaled Label-Switched Path (LSP)?()A、the time it takes to identify the optimal path for the LSPB、the interval at which the ingress router recalculates the LSP’s pathC、the time the ingress router takes to establish the primary pathD、the maximum number of times the ingress router tries to establish the primary path
考题
What is the optimize timer on an RSVP-signaled Label-Switched Path (LSP)?()A、The time it takes to identify the optimal path for the LSP.B、The interval at which the ingress router recalculates the LSP's path.C、The time the ingress router takes to establish the primary path.D、The maximum number of times the ingress router tries to establish the primary path.
考题
When an SRX series device receives an ESP packet, what happens?()A、If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, it willB、If the destination IP address in the outer IP header of ESP does not match the IP address of the ingress interface, it willC、If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, based packet.D、If the destination address of the outer IP header of the ESP packet matches the IP address of the ingress interface, based of inner header, it will decrypt the packet.
考题
单选题What is the optimize timer on an RSVP-signaled Label-Switched Path (LSP)?()A
The time it takes to identify the optimal path for the LSP.B
The interval at which the ingress router recalculates the LSP's path.C
The time the ingress router takes to establish the primary path.D
The maximum number of times the ingress router tries to establish the primary path.
考题
单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A
RFC 1149B
RFC 3704C
RFC 1918D
RFC 2827
考题
单选题You have an Exchange Server 2010 organization.You need to identify whether an administrator has made a configuration change in the Exchange organization.What should you run?()A
Get-EventLogLevelB
Get-ExchangeServerC
Exchange Best Practices AnalyzerD
Microsoft Baseline Security Analyzer (MBSA)
考题
单选题You have an Exchange Server 2010 organization that contains one Mailbox server.All users connect to Exchange by using Microsoft Office Outlook 2010.You need to identify the latency of client connections to the Mailbox server. What should you run?()A
Exchange Best Practices AnalyzerB
Message Tracking Performance toolC
Test-OutlookConnectivity cmdletD
Test-OutlookWebServices cmdlet
考题
单选题What is the optimize timer on an RSVP-signaled Label-Switched Path (LSP)?()A
the time it takes to identify the optimal path for the LSPB
the interval at which the ingress router recalculates the LSP’s pathC
the time the ingress router takes to establish the primary pathD
the maximum number of times the ingress router tries to establish the primary path
考题
多选题What are three common reasons why customers are saying that they need to evolve their data center? ()Ademand among users for access to information anytime, anywhereBdesire to use the same vender for desktop and server deploymentsCexisting equipment has reached and of lifeDincreasing operational costs of managing data centersEarchitectures that is inflexible and inefficientFselecting best-performing vendors for each individual component
考题
单选题When inspecting a tank barge to see that it has all the required fire extinguishers and other safety items aboard,which of the following is the best source for determining what is required? ()A
The supervisor in charge of the dock to which the barge is tied upB
Part 38 of the Rules and Regulations for Tank VesselsC
The Certificate of Inspection of the bargeD
The local fire marshal
考题
单选题Which one is the most important based on the following common elements of a network design?()A
Business needsB
Risk analysisC
Security policyD
Best practices
考题
单选题BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A
Sniffing attackB
Denial of service attackC
Port Scan attackD
Reconnaisance attackE
Spoofing attack
热门标签
最新试卷