网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
A
The data traffic between the access point and controller is not encrypted.
B
The data traffic is encapsulated with LWAPP.
C
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
D
The data traffic is encrypted with AES.
E
All of the above
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A The data traffic between the access point and controller is not encrypted.B The data traffic is encapsulated with LWAPP.C The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D The data traffic is encrypted with AES.E All of the above” 相关考题
考题
Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?()
A. DNS traffic is denied.B. Telnet traffic is denied.C. SMTP traffic is denied.D. Ping traffic is permitted.
考题
Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A、 LWAPP encrypts control traffic between the AP and the controller.B、 LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC、 LWAPP encrypts both control traffic and user data.D、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
考题
Which statement is true about a worm attack?()A、Human interaction is required to facilitate the spread.B、The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.C、Extremely large volumes of requests are sent over a network or over the Internet.D、Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.
考题
Which statement is true about the internal link between the Routing Engine and the Packet-Forwarding Engine?()A、It is only used for exception traffic.B、It is an FE link called fxp2.C、It is rate-limited to avoid DDOS attacks.D、It is only used to send the forwarding-table from the Routing Engine to the Packet-Forwarding Engine.
考题
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above
考题
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()A、 Real-time frame exchange is accomplished within the access point.B、 The control traffic between the client and the access point is encapsulated with the LWAPP. C、 Authentication, security, and mobility are handled by the access point.D、 Data traffic between the client and the access point is encapsulated with LWAPP.E、 None of the other alternatives apply
考题
Which statement is true about voice VLANs? ()A、When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B、The voice VLAN feature is enabled by default.C、The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D、The default CoS value is 1 for incoming voice and data traffic.
考题
Which statement about an IPS is true?()A、The IPS is in the traffic path.B、Only one active interface is required.C、Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D、When malicious traffic is detected,the IPS will only send an alert to a management station.
考题
Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()A、The tunnel that is not configured with the policy-class command acts as the defaultB、EXP selection is between multiple tunnels to the same destinationC、There is no requirement for IGP extensionsD、Tunnels are configured using the policy-class command and carry multiple EXP valuesE、It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
考题
Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted
考题
Which statement about the DVS engine is true?()A、the DVS engine can useWebroot and McAfee scanning in parallelB、the DVS engine generates the WBRSC、the DVS engine never inspects the client HTTP requestD、the DVS engine is only used for Layer 4 traffic monitoring
考题
Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A、 LWAPP encrypts both control traffic and user data.B、 LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.D、 LWAPP encrypts control traffic between the AP and the controller.E、 None of the other alternatives apply.
考题
Which statement is TRUE about the CacheFactory class ?()A、 it is a topology agnostic way to access NamedCachesB、 it provides mechanisms to manage underlying remote data sourcesC、 both A and B are TRUED、Neither A nor B are TRUE
考题
Which statement is true about the UNDO_RETENTION parameter when retention guarantee is notenabled()A、It is the time period after which the undo data becomes obsolete.B、It is the time period after which the committed undo data would be transferred to a temporarytablespace.C、It is the minimum time period up to which the committed undo data would be retained if free undo spaceis available.D、It is the time period after which the undo data is transferred to the Flash Recovery Area to provide readconsistency.
考题
单选题Which statement about an IPS is true?()A
The IPS is in the traffic path.B
Only one active interface is required.C
Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D
When malicious traffic is detected,the IPS will only send an alert to a management station.
考题
单选题Which statement about HTTPS decryption on the WSA is true?()A
if enabled, all HTTPS traffic must be decryptedB
if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC
decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD
object size can be used to determine whether the HTTPS traffic is to be decrypted
考题
单选题Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()A
The tunnel that is not configured with the policy-class command acts as the defaultB
EXP selection is between multiple tunnels to the same destinationC
There is no requirement for IGP extensionsD
Tunnels are configured using the policy-class command and carry multiple EXP valuesE
It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
考题
单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A
Physically the voice network and the data network are separate.B
The voice traffic will normally be on a different IP subnet than will the data traffic.C
End user intervention is necessary to place the phone into the proper VLAN.D
The same security policy should be implemented for both voice and data traffic.E
The data VLAN must be configured as the native VLAN.
考题
单选题Which statement is TRUE about the CacheFactory class ?()A
it is a topology agnostic way to access NamedCachesB
it provides mechanisms to manage underlying remote data sourcesC
both A and B are TRUED
Neither A nor B are TRUE
考题
单选题The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()A
Real-time frame exchange is accomplished within the access point.B
The control traffic between the client and the access point is encapsulated with the LWAPP. C
Authentication, security, and mobility are handled by the access point.D
Data traffic between the client and the access point is encapsulated with LWAPP.E
None of the other alternatives apply
考题
单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A
LWAPP encrypts both control traffic and user data.B
LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C
When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.D
LWAPP encrypts control traffic between the AP and the controller.E
None of the other alternatives apply.
考题
单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A
LWAPP encrypts control traffic between the AP and the controller.B
LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC
LWAPP encrypts both control traffic and user data.D
When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
考题
单选题Which statement is true about the internal link between the Routing Engine and the Packet-Forwarding Engine?()A
It is only used for exception traffic.B
It is an FE link called fxp2.C
It is rate-limited to avoid DDOS attacks.D
It is only used to send the forwarding-table from the Routing Engine to the Packet-Forwarding Engine.
考题
单选题Which statement is true about the UNDO_RETENTION parameter when retention guarantee is notenabled()A
It is the time period after which the undo data becomes obsolete.B
It is the time period after which the committed undo data would be transferred to a temporarytablespace.C
It is the minimum time period up to which the committed undo data would be retained if free undo spaceis available.D
It is the time period after which the undo data is transferred to the Flash Recovery Area to provide readconsistency.
考题
单选题Which statement is true about a worm attack?()A
Human interaction is required to facilitate the spread.B
The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.C
Extremely large volumes of requests are sent over a network or over the Internet.D
Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.
考题
单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A
Physically the voice network and the data network are separateB
The voice traffic will normally be on a different IP subnet than will the data trafficC
End user intervention is necessary to place the phone into the proper VLAND
The same security policy should be implemented for both voice and data trafficE
The data VLAN must be configured as the native VLAN
考题
单选题Which statement is true about voice VLANs? ()A
When the voice VLAN feature is enabled, all untagged voice and data traffic is sent through the voice VLAN.B
The voice VLAN feature is enabled by default.C
The IP phone overrides the priority of all incoming data traffic (tagged and untagged) and sets the CoS value to 0.D
The default CoS value is 1 for incoming voice and data traffic.
热门标签
最新试卷