For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。A、IPB、ICMPC、TCPD、UDP

题目

For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。

  • A、IP
  • B、ICMP
  • C、TCP
  • D、UDP

相似考题

1.China Calls for Unified International Rules Against Internet CrimeCyber security has always been a serious issue as the Internet industry is ever growing. Nowadays, people can easily connect to the Internet with a simple click of a mouse. But the global network can be easily destroyed by a single leak. The world is facing a difficult situation in keeping web security.Currently, there are no unified international rules for maintaining Internet security. China has called for unified international rules against Internet crime. Last year China and some other countries handed in a draft Code of Conduct on Information Security to the UN.World leaders and experts discussed the possible Internet threats facing the world. They agreed that the only way to deal with Internet security threats was to trust each other and strengthen cooperation. The threats cannot be solved by any one country alone. And for these reasons, countries would have a greater chance of trusting each other in dealing with such threats.Though great efforts were made to issue common regulations for the Internet, few results have been achieved yet. Theres still a long way to go for unified global Internet security rules and regulations.26. Maintaining web security is () for the world.A. easyB. a piece of cakeC. difficult27. There are () to maintain cyberspace security.A. no unified international regulationsB. unified international regulationsC. worldwide unified regulations28. The only way to deal with cyber security threats was to()A. depend on China and the United NationsB. strengthen international cooperation and trust each otherC. ask world leaders and experts for help29.().results have been achieved in terms of common regulations for the Internet.A. A lot ofB. FewC. Good30.()summited a draft Code of Conduct on Information Security.A. China onlyB. The United StatesC. China and some other countries

更多“For security reasons, the networ”相关问题
  • 第1题:

    An operator is asked to shutdown the telnet service for security reasons. What are the appropriate commands to achieve this?()

    A. comment out telnetd in /etc/services refresh -s inetd

    B. comment out telnetd in /etc/inetd.conf refresh -s inetd

    C. comment out telnetd in /etc/rc.tcpip refresh -s telnetd

    D. comment out telnetd in /etc/inetd.conf refresh -s telnetd


    参考答案:B

  • 第2题:

    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists()。

    A.IP

    B.ICMP

    C.TCP

    D.UDP


    参考答案:B

  • 第3题:

    Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()

    • A、 Cisco SDM Security Audit
    • B、 Cisco Security MARS
    • C、 Cisco Security Agent MC
    • D、 Cisco Security IntelliShield
    • E、 CAN

    正确答案:A

  • 第4题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第5题:

    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()

    • A、the use of hosted email services eliminating the need for local security
    • B、the perceived costs of security solutions
    • C、the lack of risk analysis
    • D、the lack of threats to their network
    • E、the belief that free security tools are sufficient
    • F、the desire to avoid unnecessary technologies

    正确答案:B,C

  • 第6题:

    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()

    • A、 PAT
    • B、 ACLs
    • C、 Subnet masking
    • D、 Port blocking

    正确答案:B

  • 第7题:

    For security reasons, an administrator is asked to modify the system to prevent someone from leaving a terminal logged in. To enable a five minute timeout for all users, what would need to be done to accomplish this task?()

    • A、Add the following line to /etc/environment:  TMOUT=300
    • B、Add the following lines to /.profile  TMOUT=5  export TMOUT
    • C、Execute the following command:  chuser -u ALL -a TIMEOUT=5M
    • D、Execute the following command:  chsec -u ALL -a TIMEOUT=600

    正确答案:A

  • 第8题:

    单选题
    ()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    ()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    The ship security assessment is an essential and integral part of the process of developing and updating()
    A

    the ship security plan

    B

    the company security plan

    C

    the port security plan

    D

    the national security plan


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    For security reasons, the network administrator needs to prevent pings into the corporate networks from hosts outside the internetwork. Which protocol should be blocked with access control lists?()
    A

    IP

    B

    ICMP

    C

    TCP

    D

    UDP


    正确答案: A
    解析: 暂无解析

  • 第12题:

    多选题
    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
    A

    the desire to avoid unnecessary technologies

    B

    the belief that free security tools are sufficient

    C

    the perceived costs of security solutions

    D

    the use of hosted email services eliminating the need for local security

    E

    the lack of threats to their network

    F

    the lack of risk analysis


    正确答案: A,C
    解析: 暂无解析

  • 第13题:

    There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()

    A.the use of hosted email services eliminating the need for local security

    B.the perceived costs of security solutions

    C.the lack of risk analysis

    D.the lack of threats to their network

    E.the belief that free security tools are sufficient

    F.the desire to avoid unnecessary technologies


    参考答案:B, C

  • 第14题:

    关于网络营销的翻译中,目前国内比较常用的是:()

    • A、Cyber Marketing
    • B、Interne tMarketing
    • C、Networ kMarketing
    • D、E-Marketing

    正确答案:D

  • 第15题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第16题:

    What are three valid reasons to assign ports to VLANs on a switch? ()

    • A、to make VTP easier to implement
    • B、to isolate broadcast traffic
    • C、to increase the size of the collision domain
    • D、to allow more devices to connect to the network
    • E、to logically group hosts according to function
    • F、to increase network security

    正确答案:B,E,F

  • 第17题:

    For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()

    • A、VPN concentrator
    • B、Virtual servers
    • C、Wireless
    • D、Multimode fiber

    正确答案:B

  • 第18题:

    An operator is asked to shutdown the telnet service for security reasons. What are the appropriate commands to achieve this?()

    • A、comment out telnetd in /etc/services refresh -s inetd
    • B、comment out telnetd in /etc/inetd.conf refresh -s inetd
    • C、comment out telnetd in /etc/rc.tcpip refresh -s telnetd
    • D、comment out telnetd in /etc/inetd.conf refresh -s telnetd

    正确答案:B

  • 第19题:

    For security reasons, an administrator is asked to modify the system to prevent someone from  leaving a terminal logged in.  Which of the following options would enable a five minute timeout for all users()

    • A、Add the following line to /etc/environment: TMOUT=300
    • B、Add the following lines to /.profile TMOUT=5 export TMOUT
    • C、Run the following command: chuser -u ALL -a TIMEOUT=5M
    • D、Run the following command: chsec -u ALL -a TIMEOUT=600

    正确答案:A

  • 第20题:

    单选题
    An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()
    A

     PAT

    B

     ACLs

    C

     Subnet masking

    D

     Port blocking


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    () means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    What are three valid reasons to assign ports to VLANs on a switch?()
    A

    to make VTP easier to implement

    B

    to isolate broadcast traffic

    C

    to increase the size of the collision domain

    D

    to allow more devices to connect to the network

    E

    to logically group hosts according to function

    F

    to increase network security


    正确答案: E,D
    解析: 暂无解析

  • 第23题:

    单选题
    Which operational mode command displays all active IPsec phase 2 security associations?()
    A

    show ike security-associations

    B

    show ipsec security-associations

    C

    show security ike security-associations

    D

    show security ipsec security-associations


    正确答案: C
    解析: 暂无解析

  • 第24题:

    单选题
    What does SSO stand for regarding ship security?()
    A

    Ship security office

    B

    Ship security officer

    C

    Ship security operator

    D

    Ship safety office


    正确答案: D
    解析: 暂无解析