Which of the following would restrict traffic from a specific host to a network?()
第1题:
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
第2题:
A.MIBs
B.NAS
C.ACL
D.SMTP
第3题:
A.SMTP traffic
B.ICMP messages
C.HTTP traffic
D.Email sender verification
第4题:
Which of the following BEST describes a hub?()
第5题:
Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()
第6题:
Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()
第7题:
A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()
第8题:
Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()
第9题:
A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()
第10题:
Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.
第11题:
SMTP traffic
ICMP messages
HTTP traffic
Email sender verification
第12题:
MIBs
NAS
ACL
SMTP
第13题:
A. Bridge
B. Firewall
C. Port replicator
D. Gateway
第14题:
A.IDS
B.VPN
C.NIPS
D.HIDS
第15题:
You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN:access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 anyWhat will the effect of this access list be?()
A. All traffic will be allowed to out of E0 except FTP traffic.
B. FTP traffic from 192.168.1.22 to any host will be blocked.
C. FTP traffic from 192.168.1.9 to any host will be blocked.
D. All traffic will be prevented from leaving E0.
E. All FTP traffic to network 192.168.1.9/29 from any host will be blocked.
第16题:
Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }
第17题:
Which of the following would be used to optimize network performance and increase bandwidth availability?()
第18题:
Which of the following would be the BEST way to restrict access to the WAP from certain clients?()
第19题:
Which of the following traffic types would a network layer firewall be unable to filter?()
第20题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第21题:
You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
第22题:
Inadequate RAM
Slow processor
PCI bus
Excessive network traffic
第23题:
Honeynet
Honeypot
Vulnerability scanner
Network based IDS