参考答案和解析
正确答案: B,A
解析: 暂无解析
更多“多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM”相关问题
  • 第1题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    A.to control vty access into a router

    B.to control broadcast traffic through a router

    C.to filter traffic as it passes through a router

    D.to filter traffic that originates from the router

    E.to replace passwords as a line of defense against security incursions


    参考答案:A, C

  • 第2题:

    What are two security appliances that can be installed in a network? ()

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第3题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第4题:

    What are some of the advantages of using a router to segment the network? (Choose two.)()

    • A、Filtering can occur based on Layer 3 information.
    • B、Broadcasts are eliminated.
    • C、Routers generally cost less than switches.
    • D、Broadcasts are not forwarded across the router.
    • E、Adding a router to the network decreases latency.

    正确答案:A,D

  • 第5题:

    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)

    • A、cost savings
    • B、product variety
    • C、well-tested interoperability
    • D、regular upgrade process

    正确答案:A,C

  • 第6题:

    多选题
    Refer to the exhibit. Which two statements are correct? (Choose two.)()
    A

    All six routes will be installed in the routing table.

    B

    Two routes will be installed in the routing table.

    C

    Four routes will be installed in the routing table.

    D

    All the routes were redistributed into BGP from an IGP.

    E

    All the routes were originated by BGP with the network command.


    正确答案: C,B
    解析: 暂无解析

  • 第7题:

    多选题
    Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
    A

    protocol list

    B

    MIME

    C

    block list

    D

    extension


    正确答案: A,D
    解析: 暂无解析

  • 第8题:

    多选题
    Which are the two options to which a menu can be assigned?() (Choose two.)
    A

    menu

    B

    functions

    C

    data group

    D

    responsibility

    E

    functional group


    正确答案: B,D
    解析: 暂无解析

  • 第9题:

    多选题
    What are some of the advantages of using a router to segment the network (Choose two.)()。
    A

    Filtering can occur based on Layer 3 information.

    B

    Broadcasts are eliminated.

    C

    Routers generally cost less than switches.

    D

    Broadcasts are not forwarded across the router.

    E

    Adding a router to the network decreases latency.


    正确答案: C,A
    解析: 暂无解析

  • 第10题:

    多选题
    What functions do routers perform in a network (Choose two.)()。
    A

    packet switching

    B

    access layer security

    C

    path selection

    D

    VLAN membership assignment

    E

    bridging between LAN segments

    F

    microsegmentation of broadcast domai


    正确答案: F,E
    解析: 暂无解析

  • 第11题:

    多选题
    What are two reasons that a network administrator would use access lists (Choose two.)()。
    A

    to control vty access into a router

    B

    to control broadcast traffic through a router

    C

    to filter traffic as it passes through a router

    D

    to filter traffic that originates from the router

    E

    to replace passwords as a line of defense against security incursions


    正确答案: B,C
    解析: 暂无解析

  • 第12题:

    多选题
    What are two components of the Junos software architecture? ()(Choose two.)
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    • A、Allow unrestricted access to the console or VTY ports
    • B、Use a firewall to restrict access from the outside to the network devices
    • C、Always use Telnet to access the device command line because its data is automatically encrypted
    • D、Use SSH or another encrypted and authenticated transport to access device configurations
    • E、Prevent the loss of passwords by disabling password encryption

    正确答案:B,D

  • 第14题:

    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()

    • A、copier
    • B、microwave oven
    • C、toaster
    • D、cordless phone
    • E、IP phone
    • F、AM radio

    正确答案:B,D

  • 第15题:

    What are two components of the Junos software architecture? ()(Choose two.)

    • A、Linux kernel
    • B、routing protocol daemon
    • C、session-based forwarding module
    • D、separate routing and security planes

    正确答案:B,C

  • 第16题:

    What are two security appliances that can be installed in a network? (Choose two.)()  

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第17题:

    Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)

    • A、protocol list
    • B、MIME
    • C、block list
    • D、extension

    正确答案:B,D

  • 第18题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: B,D
    解析: 暂无解析

  • 第19题:

    多选题
    What are two characteristics of Telnet (Choose two.)()。
    A

    Itsendsdataincleartextformat.

    B

    ItisnolongersupportedonCisconetworkdevices.

    C

    ItismoresecurethanSSH

    D

    Itrequiresanenterpriselicenseinordertobeimplemented.

    E

    ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    多选题
    What are two security appliances that can be installed in a network? ()
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: D,B
    解析: 暂无解析

  • 第21题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
    A

    Allow unrestricted access to the console or VTY ports.

    B

    Use a firewall to restrict access from the outside to the network devices.

    C

    Always use Telnet to access the device command line because its data is automatically encrypted.

    D

    Use SSH or another encrypted and authenticated transport to access device configurations.

    E

    Prevent the loss of passwords by disabling password encryption.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    多选题
    What are two security appliances that can be installed in a network (Choose two.)()。
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
    A

    cost savings

    B

    product variety

    C

    well-tested interoperability

    D

    regular upgrade process


    正确答案: C,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies (Choose two.)()。
    A

    copier

    B

    microwave oven

    C

    toaster

    D

    cordless phone

    E

    IP phone

    F

    AM radio


    正确答案: D,B
    解析: 暂无解析