多选题What are three benefits of using IPv6?()AIPv6 supports a greater level of security by integrating features that were optional add-ons in IPv4.BIPv6 reduces administrative overhead using stateless address autoconfiguration for hosts.CIPv6 eliminates the

题目
多选题
What are three benefits of using IPv6?()
A

IPv6 supports a greater level of security by integrating features that were optional add-ons in IPv4.

B

IPv6 reduces administrative overhead using stateless address autoconfiguration for hosts.

C

IPv6 eliminates the need for private to public NAT using a large address pool.

D

IPv6 provides backward compatibility with IPv4 using the Next Header field.

E

IPv6 represents large IP addresses using dotted decimal notation.


相似考题
更多“多选题What are three benefits of using IPv6?()AIPv6 supports a greater level of security by integrating features that were optional add-ons in IPv4.BIPv6 reduces administrative overhead using stateless address autoconfiguration for hosts.CIPv6 eliminates the”相关问题
  • 第1题:

    What are two benefits of using NAT?()

    A.NAT protects network security because private networks are not advertised.

    B.NAT accelerates the routing process because no modifications are made on the packets.

    C.Dynamic NAT facilitates connections from the outside of the network.

    D.NAT facilitates end-to-end communication when IPsec is enable.

    E.NAT eliminates the need to re-address all host that require extemal access.

    F.NAT conserves addresses through host MAC-level multiplexing.


    参考答案:A, E

  • 第2题:

    When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()

    • A、 TKIP uses an advanced encryption scheme based on AES
    • B、 TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)
    • C、 TKIP provides per-packet keyingand a rekeying mechanism
    • D、 TKIP provides message integrity check
    • E、 TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset
    • F、 TKIP uses a 48 bit InitializationVector

    正确答案:C,D,F

  • 第3题:

    Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()

    • A、allows dynamic routing over the tunnel
    • B、supports multi-protocol (non-IP) traffic over the tunnel
    • C、reduces IPsec headers overhead since tunnel mode is used
    • D、simplifies the ACL used in the crypto map
    • E、uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

    正确答案:A,B,D

  • 第4题:

    What are three benefits of using IPv6?()

    • A、IPv6 supports a greater level of security by integrating features that were optional add-ons in IPv4.
    • B、IPv6 reduces administrative overhead using stateless address autoconfiguration for hosts.
    • C、IPv6 eliminates the need for private to public NAT using a large address pool.
    • D、IPv6 provides backward compatibility with IPv4 using the Next Header field.
    • E、IPv6 represents large IP addresses using dotted decimal notation.

    正确答案:A,B,C

  • 第5题:

    Which three causes could prevent a host from getting an IPv6 address with stateless autoconfiguration?()

    • A、The autoconfig command is missing from the router interface.
    • B、IPv6 multicast routing is not enabled on the router interface.
    • C、IPv6 unicast routing is not enabled on the router interface.
    • D、The router interface is configured with a /63 mask.
    • E、The router interface is configured with a /65 mask.

    正确答案:C,D,E

  • 第6题:

    What are three benefits of using chassis clustering?()

    • A、Provides stateful session failover for sessions.
    • B、Increases security capabilities for IPsec sessions.
    • C、Provides active-passive control and data plane redundancy.
    • D、Enables automated fast-reroute capabilities.
    • E、Synchronizes configuration files and session state

    正确答案:A,C,E

  • 第7题:

    You need to recommend a solution for managing administrative rights for the branch office client computers. The solution must meet the companys technical requirements.What should you recommend configuring?()

    • A、Account Policies by using GPOs
    • B、Local Users and Groups by using Group Policy preferences
    • C、Restricted Groups by using GPOs
    • D、Security Options by using Group Policy preferences

    正确答案:B

  • 第8题:

    多选题
    What are three benefits of using ASM?()
    A

    Ease of disk administration and maintenance

    B

    Load balancing across physical disks

    C

    Software RAID-1 data redundancy with double or triple mirrors

    D

    Automatic recovery of failed disks


    正确答案: A,B
    解析: 暂无解析

  • 第9题:

    多选题
    When implementing WLAN security, what are three benefits of using the Temporal Key Integrity Protocol (TKIP) instead of WEP? ()
    A

    TKIP uses an advanced encryption scheme based on AES

    B

    TKIP provides authentication and integrity checking using Cipher Block Chaining Message Authentication Code (CBC-MAC)

    C

    TKIP provides per-packet keyingand a rekeying mechanism

    D

    TKIP provides message integrity check

    E

    TKIP reduces WEP’s vulnerabilities byusing different hardware encryption chipset

    F

    TKIP uses a 48 bit InitializationVector


    正确答案: E,F
    解析: 暂无解析

  • 第10题:

    多选题
    What are three features of the IPV6 protocol?()
    A

    complicated header

    B

    plug-and-play

    C

    no broadcasts

    D

    checksums

    E

    optional IPsec

    F

    autoconfiguration


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    多选题
    What are three benefits of using IPv6?()
    A

    IPv6 supports a greater level of security by integrating features that were optional add-ons in IPv4.

    B

    IPv6 reduces administrative overhead using stateless address autoconfiguration for hosts.

    C

    IPv6 eliminates the need for private to public NAT using a large address pool.

    D

    IPv6 provides backward compatibility with IPv4 using the Next Header field.

    E

    IPv6 represents large IP addresses using dotted decimal notation.


    正确答案: C,B
    解析: 暂无解析

  • 第12题:

    多选题
    Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()
    A

    allows dynamic routing over the tunnel

    B

    supports multi-protocol (non-IP) traffic over the tunnel

    C

    reduces IPsec headers overhead since tunnel mode is used

    D

    simplifies the ACL used in the crypto map

    E

    uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration


    正确答案: B,E
    解析: 暂无解析

  • 第13题:

    Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)

    • A、flags indicating the kind of autoconfiguration that can be done by hosts
    • B、default router information
    • C、/64 prefix that can be used on the link and the lifetime of the prefix
    • D、IPv6 DHCP server address information

    正确答案:A,B,C

  • 第14题:

    What are two benefits of using a single OSPF area network design?()

    • A、it reduces the number of required OSPF neighbor adjacencies
    • B、It reduces the types of LSAs that are generated
    • C、It is less CPU intensive for routers in the single area
    • D、It increases LSA response times.
    • E、It removes the need for virtual links

    正确答案:B,E

  • 第15题:

    What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()

    • A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
    • B、 automatic reconfiguration s of the security devices based on current security threats
    • C、 containment and control of security threats
    • D、 application security
    • E、 anti-x defense F- virtual firewall

    正确答案:C,D,E

  • 第16题:

    What are three features of the IPV6 protocol?()

    • A、complicated header
    • B、plug-and-play
    • C、no broadcasts
    • D、checksums
    • E、optional IPsec
    • F、autoconfiguration

    正确答案:B,C,F

  • 第17题:

    Which activity supports the data integrity requirements of an application?()

    • A、Using HTTPS as a protocol
    • B、Using an LDAP security realm
    • C、Using HTTP Basic authentication
    • D、Using forms-based authentication

    正确答案:A

  • 第18题:

    What are two reasons for using a virtual link in OSPF?()

    • A、Provides fast convergence times.
    • B、Supports connections of multiple backbones.
    • C、Eliminates the need for a Designated Router.
    • D、Supports non direct connections to the backbone.

    正确答案:B,D

  • 第19题:

    多选题
    What are two benefits of using a single OSPF area network design?()
    A

    it reduces the number of required OSPF neighbor adjacencies

    B

    It reduces the types of LSAs that are generated

    C

    It is less CPU intensive for routers in the single area

    D

    It increases LSA response times.

    E

    It removes the need for virtual links


    正确答案: D,E
    解析: 暂无解析

  • 第20题:

    多选题
    What are two benefits of using NAT?()
    A

    NAT protects network security because privat enetworks are not advertised.

    B

    NAT accelerates the routing process because no modifications are made on the packets.

    C

    Dynamic NAT facilitates connections from the outside of the network.

    D

    NAT facilitates end-to-end communication when IPsec is enable.

    E

    NAT eliminates the need to re-address all host that require extemal access.

    F

    NAT conserves addresses through host MAC-level multiplexing.


    正确答案: B,E
    解析: 暂无解析

  • 第21题:

    多选题
    Which three causes could prevent a host from getting an IPv6 address with stateless autoconfiguration?()
    A

    The autoconfig command is missing from the router interface.

    B

    IPv6 multicast routing is not enabled on the router interface.

    C

    IPv6 unicast routing is not enabled on the router interface.

    D

    The router interface is configured with a /63 mask.

    E

    The router interface is configured with a /65 mask.


    正确答案: A,E
    解析: 暂无解析

  • 第22题:

    多选题
    Which three of these items are found within the router advertisement message of IPv6 stateless autoconfiguration?() (Choose three.)
    A

    flags indicating the kind of autoconfiguration that can be done by hosts

    B

    default router information

    C

    /64 prefix that can be used on the link and the lifetime of the prefix

    D

    IPv6 DHCP server address information


    正确答案: A,B
    解析: 暂无解析

  • 第23题:

    多选题
    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
    A

    The ability to detect and prevent malicious traffic.

    B

    The ability to associate security breaches with a specific user.

    C

    Converged management of network and security events, network flow data, and identity information.

    D

    Consistent device management across administrative realms.


    正确答案: D,C
    解析: 暂无解析

  • 第24题:

    多选题
    What are three benefits of using chassis clustering?()
    A

    Provides stateful session failover for sessions.

    B

    Increases security capabilities for IPsec sessions.

    C

    Provides active-passive control and data plane redundancy.

    D

    Enables automated fast-reroute capabilities.

    E

    Synchronizes configuration files and session state


    正确答案: A,B
    解析: 暂无解析