网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which of the following IOS features can prevent IP spoofing attacks?()
A

PPP over Ethernet

B

Cisco Express forwarding

C

MPLS traffic Engineering

D

IS-IS routing

E

Unicast Reverse Path Forwarding(uRPF)


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which of the following IOS features can prevent IP spoofing attacks?()A PPP over EthernetB Cisco Express forwardingC MPLS traffic EngineeringD IS-IS routingE Unicast Reverse Path Forwarding(uRPF)” 相关考题
考题 Which of the following features would hide internal IP addresses from the Internet?() A. Network Address TranslationB. Port forwardingC. Quality of ServiceD. SSID broadcast

考题 Which of the following features on a wireless router maps the private IP address to a public IPaddress?() A. SSIDB. NATC. MAC filteringD. DHCP

考题 You are attempting to troubleshoot some problems within your local network.Which of the following are router IOS commands that can be used to troubleshoot LAN connectivity problems?() A. pingB. tracertC. ipconfigD. show ip routeE. winipcfgF. show interfacesG. All of the above

考题 Which router IOS commands can be used to troubleshoot LAN connectivity problems? () A.pingB.tracertC.ipconfigD.show ip routeE.winipcfgF.show interfaces

考题 Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing

考题 Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above

考题 Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.

考题 The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()A、 DHCP spoofing and SPAN cannot be used on the same port of a switch.B、 To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.C、 To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.D、 DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E、 None of the other alternatives apply.

考题 Which router IOS commands can be used to troubleshoot LAN connectivity problems?()A、pingB、tracertC、ipconfigD、show ip routeE、winipcfgF、show interfaces

考题 Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

考题 Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)

考题 You are attempting to troubleshoot some problems within your local network.Which of the following are router IOS commands that can be used to troubleshoot LAN connectivity problems?()A、pingB、tracertC、ipconfigD、show ip routeE、winipcfgF、show interfacesG、All of the above

考题 Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.

考题 Which of the following IOS commands could you use to troubleshoot a router connectivity problem on an IP network?()A、show ip routeB、ipconfigC、tracertD、show interfacesE、tracerouteF、pingG、All of the above

考题 Which of the following features on a wireless router maps the private IP address to a public IPaddress?()A、SSIDB、NATC、MAC filteringD、DHCP

考题 Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()A、The firewall settingsB、The DHCP addressC、The workgroup nameD、The SSID

考题 多选题You are attempting to troubleshoot some problems within your local network.Which of the following are router IOS commands that can be used to troubleshoot LAN connectivity problems?()ApingBtracertCipconfigDshow ip routeEwinipcfgFshow interfacesGAll of the above

考题 多选题Which of the following IOS commands could you use to troubleshoot a router connectivity problem on an IP network?()Ashow ip routeBipconfigCtracertDshow interfacesEtracerouteFpingGAll of the above

考题 单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A  policy based routing (PBR)B  unicast reverse path forwarding (uRPF)C  lock and keyACLD  RFC 1918filteringE  IP source routing

考题 单选题Which of the following descriptions about IP spoofing is correct?()A IP source address is forgedB IP destination address is forgedC IP TCP source port is forgedD IP TCP destination port is forgedE None of above

考题 单选题The Company security administrator wants to prevent DHCP spoofing.  Which statement is true  about DHCP spoofing operation?()A  DHCP spoofing and SPAN cannot be used on the same port of a switch.B  To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be  updated by a dynamic ARP packet.C  To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static  entry pointing towards the DHCP server.D  DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E  None of the other alternatives apply.

考题 单选题Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A mtuB sb-maxC rfc1323D tcp_mssdflt

考题 多选题An OSPF link can be in multiple states at any givenmoment(ie.Exstart,exchange,full). Which two IOS commands let you view the state of the link()Ashow ip ospfBshow ip protocolsCshow ip ospfneighborDshow ip ospfinterface

考题 单选题Which of the following features would hide internal IP addresses from the Internet?()A Network Address TranslationB Port forwardingC Quality of ServiceD SSID broadcast

考题 多选题Which router IOS commands can be used to troubleshoot LAN connectivity problems?()ApingBtracertCipconfigDshow ip routeEwinipcfgFshow interfaces

考题 单选题Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()A ip dhcp pool ClientB network 10.1.1.0 255.255.255.240C default-router 10.1.1.1D dns-server 10.2.2.2E domain-name cisco.comF option 150 ip 10.3.3.3

考题 单选题Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()A The firewall settingsB The DHCP addressC The workgroup nameD The SSID

考题 多选题Which IOS commands can a network technician use to verify all RIP, IGRP,EIGRP, and OSPF routing protocol configurations?()Adebug ip routingBshow running-configCshow ip route protocolsDshow ip protocolsEshow protocols al