网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following IOS features can prevent IP spoofing attacks?()
A
PPP over Ethernet
B
Cisco Express forwarding
C
MPLS traffic Engineering
D
IS-IS routing
E
Unicast Reverse Path Forwarding(uRPF)
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following IOS features can prevent IP spoofing attacks?()A PPP over EthernetB Cisco Express forwardingC MPLS traffic EngineeringD IS-IS routingE Unicast Reverse Path Forwarding(uRPF)” 相关考题
考题
Which of the following features would hide internal IP addresses from the Internet?()
A. Network Address TranslationB. Port forwardingC. Quality of ServiceD. SSID broadcast
考题
Which of the following features on a wireless router maps the private IP address to a public IPaddress?()
A. SSIDB. NATC. MAC filteringD. DHCP
考题
You are attempting to troubleshoot some problems within your local network.Which of the following are router IOS commands that can be used to troubleshoot LAN connectivity problems?()
A. pingB. tracertC. ipconfigD. show ip routeE. winipcfgF. show interfacesG. All of the above
考题
Which router IOS commands can be used to troubleshoot LAN connectivity problems? ()
A.pingB.tracertC.ipconfigD.show ip routeE.winipcfgF.show interfaces
考题
Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing
考题
Which of the following descriptions about IP spoofing is correct?()A、IP source address is forgedB、IP destination address is forgedC、IP TCP source port is forgedD、IP TCP destination port is forgedE、None of above
考题
Which two network attack statements are true?()A、Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.B、Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.C、DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.D、DoS attacks can consist of IP spoofing and DDoS attacks.E、IP spoofing can be reduced through the use of policy-based routing.F、IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
考题
The Company security administrator wants to prevent DHCP spoofing. Which statement is true about DHCP spoofing operation?()A、 DHCP spoofing and SPAN cannot be used on the same port of a switch.B、 To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a dynamic ARP packet.C、 To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry pointing towards the DHCP server.D、 DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E、 None of the other alternatives apply.
考题
Which router IOS commands can be used to troubleshoot LAN connectivity problems?()A、pingB、tracertC、ipconfigD、show ip routeE、winipcfgF、show interfaces
考题
Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL
考题
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
考题
You are attempting to troubleshoot some problems within your local network.Which of the following are router IOS commands that can be used to troubleshoot LAN connectivity problems?()A、pingB、tracertC、ipconfigD、show ip routeE、winipcfgF、show interfacesG、All of the above
考题
Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.
考题
Which of the following IOS commands could you use to troubleshoot a router connectivity problem on an IP network?()A、show ip routeB、ipconfigC、tracertD、show interfacesE、tracerouteF、pingG、All of the above
考题
Which of the following features on a wireless router maps the private IP address to a public IPaddress?()A、SSIDB、NATC、MAC filteringD、DHCP
考题
Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()A、The firewall settingsB、The DHCP addressC、The workgroup nameD、The SSID
考题
多选题You are attempting to troubleshoot some problems within your local network.Which of the following are router IOS commands that can be used to troubleshoot LAN connectivity problems?()ApingBtracertCipconfigDshow ip routeEwinipcfgFshow interfacesGAll of the above
考题
多选题Which of the following IOS commands could you use to troubleshoot a router connectivity problem on an IP network?()Ashow ip routeBipconfigCtracertDshow interfacesEtracerouteFpingGAll of the above
考题
单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A
policy based routing (PBR)B
unicast reverse path forwarding (uRPF)C
lock and keyACLD
RFC 1918filteringE
IP source routing
考题
单选题Which of the following descriptions about IP spoofing is correct?()A
IP source address is forgedB
IP destination address is forgedC
IP TCP source port is forgedD
IP TCP destination port is forgedE
None of above
考题
单选题The Company security administrator wants to prevent DHCP spoofing. Which statement is true about DHCP spoofing operation?()A
DHCP spoofing and SPAN cannot be used on the same port of a switch.B
To prevent a DHCP spoofing, the DHCP server must create a static ARP entry that cannot be updated by a dynamic ARP packet.C
To prevent a DHCP spoofing, the switch must have DHCP server services disabled and a static entry pointing towards the DHCP server.D
DHCP spoofing can be prevented by placing all unused ports in an unused VLAN.E
None of the other alternatives apply.
考题
单选题Which of the following parameters can prevent packet fragmentation on routers when connecting to remote networks?()A
mtuB
sb-maxC
rfc1323D
tcp_mssdflt
考题
多选题An OSPF link can be in multiple states at any givenmoment(ie.Exstart,exchange,full). Which two IOS commands let you view the state of the link()Ashow ip ospfBshow ip protocolsCshow ip ospfneighborDshow ip ospfinterface
考题
单选题Which of the following features would hide internal IP addresses from the Internet?()A
Network Address TranslationB
Port forwardingC
Quality of ServiceD
SSID broadcast
考题
多选题Which router IOS commands can be used to troubleshoot LAN connectivity problems?()ApingBtracertCipconfigDshow ip routeEwinipcfgFshow interfaces
考题
单选题Refer to the exhibit. Which of the following IOS DHCP configuration statements is required so that a Cisco skinny-based IP phone can connect with CallManager?()A
ip dhcp pool ClientB
network 10.1.1.0 255.255.255.240C
default-router 10.1.1.1D
dns-server 10.2.2.2E
domain-name cisco.comF
option 150 ip 10.3.3.3
考题
单选题Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()A
The firewall settingsB
The DHCP addressC
The workgroup nameD
The SSID
考题
多选题Which IOS commands can a network technician use to verify all RIP, IGRP,EIGRP, and OSPF routing protocol configurations?()Adebug ip routingBshow running-configCshow ip route protocolsDshow ip protocolsEshow protocols al
热门标签
最新试卷