ATM
IDS
IOS
IOX
IPS
SDM
第1题:
A.to control vty access into a router
B.to control broadcast traffic through a router
C.to filter traffic as it passes through a router
D.to filter traffic that originates from the router
E.to replace passwords as a line of defense against security incursions
第2题:
What are two security appliances that can be installed in a network? ()
第3题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第4题:
What are some of the advantages of using a router to segment the network? (Choose two.)()
第5题:
As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
第6题:
All six routes will be installed in the routing table.
Two routes will be installed in the routing table.
Four routes will be installed in the routing table.
All the routes were redistributed into BGP from an IGP.
All the routes were originated by BGP with the network command.
第7题:
protocol list
MIME
block list
extension
第8题:
menu
functions
data group
responsibility
functional group
第9题:
Filtering can occur based on Layer 3 information.
Broadcasts are eliminated.
Routers generally cost less than switches.
Broadcasts are not forwarded across the router.
Adding a router to the network decreases latency.
第10题:
packet switching
access layer security
path selection
VLAN membership assignment
bridging between LAN segments
microsegmentation of broadcast domai
第11题:
to control vty access into a router
to control broadcast traffic through a router
to filter traffic as it passes through a router
to filter traffic that originates from the router
to replace passwords as a line of defense against security incursions
第12题:
Linux kernel
routing protocol daemon
session-based forwarding module
separate routing and security planes
第13题:
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
第14题:
Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()
第15题:
What are two components of the Junos software architecture? ()(Choose two.)
第16题:
What are two security appliances that can be installed in a network? (Choose two.)()
第17题:
Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
第18题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第19题:
Itsendsdataincleartextformat.
ItisnolongersupportedonCisconetworkdevices.
ItismoresecurethanSSH
Itrequiresanenterpriselicenseinordertobeimplemented.
ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
第20题:
ATM
IDS
IOS
IOX
IPS
SDM
第21题:
Allow unrestricted access to the console or VTY ports.
Use a firewall to restrict access from the outside to the network devices.
Always use Telnet to access the device command line because its data is automatically encrypted.
Use SSH or another encrypted and authenticated transport to access device configurations.
Prevent the loss of passwords by disabling password encryption.
第22题:
ATM
IDS
IOS
IOX
IPS
SDM
第23题:
cost savings
product variety
well-tested interoperability
regular upgrade process
第24题:
copier
microwave oven
toaster
cordless phone
IP phone
AM radio