更多“Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP”相关问题
  • 第1题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    A. Honeynet

    B. Honeypot

    C. Vulnerability scanner

    D. Network based IDS


    参考答案:A

  • 第2题:

    Whichofthefollowingwouldrestricttrafficfromaspecifichosttoanetwork?()

    A.MIBs

    B.NAS

    C.ACL

    D.SMTP


    参考答案:C

  • 第3题:

    Which of the following traffic types would a network layer firewall be unable to filter?()

    A.SMTP traffic

    B.ICMP messages

    C.HTTP traffic

    D.Email sender verification


    参考答案:D

  • 第4题:

    Which of the following BEST describes a hub?()

    • A、Determines the best route to transmit data
    • B、Inspects traffic and accepts or declines transmission
    • C、Broadcasts data to specific network devices
    • D、Broadcasts data to all network devices

    正确答案:D

  • 第5题:

    Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()

    • A、Inadequate RAM
    • B、Slow processor
    • C、PCI bus
    • D、Excessive network traffic

    正确答案:A

  • 第6题:

    Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()

    • A、Switch
    • B、Repeater
    • C、Hub
    • D、WAP

    正确答案:A

  • 第7题:

    A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()

    • A、DHCP
    • B、PAT
    • C、Proxy
    • D、IPX

    正确答案:B

  • 第8题:

    Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()

    • A、Bridge
    • B、Firewall
    • C、Port replicator
    • D、Gateway

    正确答案:B

  • 第9题:

    A host is to be part of a very small private network, which will never be connected to any other networks.  Which of the following name resolution schemes would be the easiest to implement?()

    • A、DNS
    • B、NIS
    • C、DHCP
    • D、etc/hosts file

    正确答案:D

  • 第10题:

    Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.

    • A、DNS traffic is denied.
    • B、Telnet traffic is denied.
    • C、SMTP traffic is denied.
    • D、Ping traffic is permitted

    正确答案:B

  • 第11题:

    单选题
    Which of the following traffic types would a network layer firewall be unable to filter?()
    A

    SMTP traffic

    B

    ICMP messages

    C

    HTTP traffic

    D

    Email sender verification


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following would restrict traffic from a specific host to a network?()
    A

    MIBs

    B

    NAS

    C

    ACL

    D

    SMTP


    正确答案: B
    解析: 暂无解析

  • 第13题:

    Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()

    A. Bridge

    B. Firewall

    C. Port replicator

    D. Gateway


    参考答案:B

  • 第14题:

    Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

    A.IDS

    B.VPN

    C.NIPS

    D.HIDS


    参考答案:C

  • 第15题:

    You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN:access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 anyWhat will the effect of this access list be?()

    A. All traffic will be allowed to out of E0 except FTP traffic.

    B. FTP traffic from 192.168.1.22 to any host will be blocked.

    C. FTP traffic from 192.168.1.9 to any host will be blocked.

    D. All traffic will be prevented from leaving E0.

    E. All FTP traffic to network 192.168.1.9/29 from any host will be blocked.


    参考答案:D

  • 第16题:

    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }

    • A、DNS traffic is denied.
    • B、HTTP traffic is denied.
    • C、FTP traffic is permitted.
    • D、SMTP traffic is permitted.

    正确答案:A,C

  • 第17题:

    Which of the following would be used to optimize network performance and increase bandwidth availability?()

    • A、Packet analysis
    • B、QoS
    • C、Traffic shaping
    • D、Fault tolerance

    正确答案:C

  • 第18题:

    Which of the following would be the BEST way to restrict access to the WAP from certain clients?()

    • A、Disable DHCP server
    • B、Enable WEP encryption
    • C、Disable SSID broadcast
    • D、Enable MAC filtering

    正确答案:D

  • 第19题:

    Which of the following traffic types would a network layer firewall be unable to filter?()

    • A、SMTP traffic
    • B、ICMP messages
    • C、HTTP traffic
    • D、Email sender verification

    正确答案:D

  • 第20题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第21题:

    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()

    • A、user name
    • B、password length
    • C、certificate
    • D、Host Checker

    正确答案:C,D

  • 第22题:

    单选题
    Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()
    A

     Inadequate RAM

    B

     Slow processor

    C

     PCI bus

    D

     Excessive network traffic


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
    A

    Honeynet

    B

    Honeypot

    C

    Vulnerability scanner

    D

    Network based IDS


    正确答案: D
    解析: 暂无解析