Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
Access attacks can consist of UDP and TCP SYN flooding,ICMP echo-request floods,and ICMP directed broadcasts.
DoS attacks can be reduced through the use of access control configuration,encryption,and RFC 2827 filtering.
DoS attacks can consist of IP spoofing and DDoS attacks.
IP spoofing can be reduced through the use of policy-based routing.
IP spoofing exploits known vulnerabilities in authentication services, FTP services,and web services to gain entry to web accounts,confidential databases,and other sensitive information.
第1题:
Which two statements are true about the command ip route 172.16.3.0 255.255.255.0 192.168.2.4? (Choose two.)()
第2题:
Which two statements are true about optical networks?()
第3题:
Which two statements describe the functions and operations of IDS and IPS systems?()
第4题:
An etwork administrator has enabled OSPF across an NBMA network and has issued the command ip ospf network nonbroadcast. Given those facts, which two statements are true?()
第5题:
Which two statements are true about the implementation of QoS? ()
第6题:
Which two statements are true of a network mask?()
第7题:
Which two statements are true regarding L2TP? ()(Choose two.)
第8题:
SSID broadcast prevention
man-in-the-middle attack protection
cost reduction through software upgrades in all existing hardware
dynamic key generation
RF jamming prevention
第9题:
Once saved, a rescue configuration is loaded using the rollback 0 command.
The rescue configuration must contain the minimal elements necessary to restore network connectivity.
A minimal rescue configuration is defined by default.
A rescue configuration must include a root password.
第10题:
A subnet mask specifies the portion of an IP address that is in a binary format
A subnet mask specifies the portion of an IP address that is in a decimal format
A subnet mask specifies the portion of an IP address that represents a network prefix
A subnet mask specifies the portion of an IP address that represetns network hosts
第11题:
IDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.
IDP inspects traffic up to the Application layer.
IDP searches the data stream for specific attack patterns.
IDP inspects traffic up to the Presentation layer.
IDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.
第12题:
A subnet mask specifies the portion of an IP address that is in a binary format.
A subnet mask specifies the portion of an IP address that is in a decimal format.
A subnet mask specifies the portion of an IP address that represents a network prefix.
A subnet mask specifies the portion of an IP address that represents network hosts.
第13题:
Which two statements are true about L2TP tunnels?() (Choose two.)
第14题:
Which two statements are true about the application of QoS in a converged network?()
第15题:
Which two statements are true about network voice traffic? (Choose two.)()
第16题:
Which two statements about the use of VLANs to segment a network are true? ()
第17题:
Which of the following statements are true?()
第18题:
Which two statements are true of a network mask?()
第19题:
Traffic is clear text
Traffic is encrypted
They are initiated by the LNS
They are initiated by the LAC
第20题:
end-to-end network delay times that exceed 50 ms for real-time traffic are considered unacceptable
end-to-end network delay times that exceed 250 ms for real-time traffic are considered unacceptable
end-to-end network delay is not a factor as long as the delay is consistent
some packet loss can be corrected by codec algorithms
RSVP handles voice packet retransmission
fragmentation is a result of packet loss
第21题:
Tunnels are initiated by the LAC
Tunnels are initiated by the LNS
By default, subscriber authentication occurs on the LNS
By default, subscriber authentication occurs on the LAC
第22题:
The equals() method determines if reference values refer to the same object.
The == operator determines if the contents and type of two separate objects match.
The equals() method returns true only when the contents of two objects match.
The class File overrides equals() to return true if the contents and type of two separate objects match.
第23题:
It supports fast synchronization at starting and before network failures
It supports automatic server discovery
It uses a fixed-point arithmetion
It supports the nanokernel kernel implementation
It does not support Public-Key Cryptography
第24题:
It establishes a static route to the 172.16.3.0 network.
It establishes a static route to the 192.168.2.0 network.
It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
It configures the router to send any traffic for an unknown destination out the interface with the address 192.168.2.4.
It uses the default administrative distance.
It is a route that would be used last if other routes to the same destination exist.