多选题Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).A22B23C143D161E162F8080

题目
多选题
Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).
A

22

B

23

C

143

D

161

E

162

F

8080


相似考题
更多“多选题Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).A22B23C143D161E162F8080”相关问题
  • 第1题:

    By default, which of the following ports would a network need to have opened to allow for thetransmission of incoming and outgoing email?() (Select TWO).

    A.21

    B.25

    C.80

    D.110

    E.123


    参考答案:B, D

  • 第2题:

    Which of the following allows a program or port through a software firewall?()

    • A、Exception
    • B、Pass-through
    • C、Port-forwarding
    • D、Punch-through

    正确答案:A

  • 第3题:

    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()

    • A、 Port security can be configured for ports supporting VoIP.
    • B、 With port security configured, four MAC addresses are allowed by default.
    • C、 The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.
    • D、  Withsecurity configured, only one MAC addresses is allowed by default.  
    • E、 Port security cannot be configured for ports supporting VoIP.

    正确答案:A,D

  • 第4题:

    An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic. Which of the following settings would BEST provide additional monitoring security?()

    • A、Setting up a custom community name
    • B、Configuring the network to block traffic on port 161
    • C、Configuring the Windows Firewall to block port 161
    • D、Setting SNMP to read only on the devices
    • E、Installing new MIBs

    正确答案:D,E

  • 第5题:

    Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).

    • A、22
    • B、23
    • C、143
    • D、161
    • E、162
    • F、8080

    正确答案:D,E

  • 第6题:

    Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()

    • A、21
    • B、443
    • C、3389
    • D、8080

    正确答案:C

  • 第7题:

    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()

    • A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.
    • B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.
    • C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.
    • D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

    正确答案:B

  • 第8题:

    多选题
    Which of the following ports would have to be allowed through a firewall to allow SNMP traffic topass on its default port?() (Select TWO).
    A

    22

    B

    23

    C

    143

    D

    161

    E

    162

    F

    8080


    正确答案: B,C
    解析: 暂无解析

  • 第9题:

    多选题
    An administrator has purchased monitoring software that can be configured to alert administrators when hardware and applications are having issues. All devices are configured with SNMP, but the administrator wants to further secure the SNMP traffic.  Which of the following settings would BEST provide additional monitoring security?()
    A

    Setting up a custom community name

    B

    Configuring the network to block traffic on port 161

    C

    Configuring the Windows Firewall to block port 161

    D

    Setting SNMP to read only on the devices

    E

    Installing new MIBs


    正确答案: D,E
    解析: 暂无解析

  • 第10题:

    多选题
    You need to configure port security on switch R1.  Which two statements are true about this  technology? ()
    A

    Port security can be configured for ports supporting VoIP.

    B

    With port security configured, four MAC addresses are allowed by default.

    C

    The network administrator must manually enter the MAC address for each device in order for  the switch to allow connectivity.

    D

      Withsecurity configured, only one MAC addresses is allowed by default.

    E

    Port security cannot be configured for ports supporting VoIP.


    正确答案: A,E
    解析: 暂无解析

  • 第11题:

    多选题
    By default, which of the following ports would a network need to have opened to allow for thetransmission of incoming and outgoing email?() (Select TWO).
    A

    21

    B

    25

    C

    80

    D

    110

    E

    123


    正确答案: E,A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following ports should be allowed through a firewall for Telnet to function?()
    A

    23

    B

    25

    C

    50

    D

    110


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()

    • A、Network layer firewall
    • B、Stateful inspection firewall
    • C、Zone aware firewall
    • D、Application layer firewall

    正确答案:D

  • 第14题:

    An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()

    • A、The switch must be configured with an IP address,subnet mask,and default gateway.
    • B、The switch must be connected to a router over a VLAN trunk.
    • C、The switch must be reachable through a port connected to its management VLAN.
    • D、The switch console port must be connected to the Ethernet LAN.
    • E、The switch management VLAN must be created and have a membership of at least one switch port.
    • F、The switch must be fully configured as an SNMP agent.

    正确答案:A,C

  • 第15题:

    Which of the following is the BEST way to allow web software through the server firewall?()

    • A、Implement an application exception.
    • B、Implement an access control list (ACL).
    • C、Open the corporate firewall to allow port 80.
    • D、Implement port blocking on port 80.

    正确答案:B

  • 第16题:

    Which of the following ports should be allowed through a firewall for Telnet to function?()

    • A、23
    • B、25
    • C、50
    • D、110

    正确答案:A

  • 第17题:

    By default, which of the following ports would a network need to have opened to allow for thetransmission of incoming and outgoing email?() (Select TWO).

    • A、21
    • B、25
    • C、80
    • D、110
    • E、123

    正确答案:B,D

  • 第18题:

    Which of the following ports are used by default for web servers? ()(Select TWO)

    • A、80
    • B、110
    • C、123
    • D、143
    • E、443

    正确答案:A,E

  • 第19题:

    多选题
    Which two traffic types trigger pass-through firewall user authentication?()
    A

    SSH

    B

    Telnet

    C

    ICMP

    D

    OSPF

    E

    HTTP


    正确答案: D,E
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()
    A

    21

    B

    443

    C

    3389

    D

    8080


    正确答案: D
    解析: 暂无解析

  • 第21题:

    多选题
    Which of the following ports are used by default for web servers? ()(Select TWO)
    A

    80

    B

    110

    C

    123

    D

    143

    E

    443


    正确答案: D,E
    解析: 暂无解析

  • 第22题:

    多选题
    An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()
    A

    The switch must be configured with an IP address,subnet mask,and default gateway.

    B

    The switch must be connected to a router over a VLAN trunk.

    C

    The switch must be reachable through a port connected to its management VLAN.

    D

    The switch console port must be connected to the Ethernet LAN.

    E

    The switch management VLAN must be created and have a membership of at least one switch port.

    F

    The switch must be fully configured as an SNMP agent.


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    单选题
    You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()
    A

     Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.

    B

     Allow all inbound VPN traffic to pass through the perimeter firewall only.

    C

     Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.

    D

     Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following allows a program or port through a software firewall?()
    A

    Exception

    B

    Pass-through

    C

    Port-forwarding

    D

    Punch-through


    正确答案: A
    解析: 暂无解析