Provides stateful session failover for sessions.
Increases security capabilities for IPsec sessions.
Provides active-passive control and data plane redundancy.
Enables automated fast-reroute capabilities.
Synchronizes configuration files and session state
第1题:
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()
第2题:
Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three ofthese belong to the data plane?()
第3题:
What are three facts control plane policing? ()
第4题:
What are three benefits of IF-MAP Federation?()
第5题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()
第6题:
What are three benefits of using ASM?()
第7题:
LDAP
ICMP
RTP
BGP
SSH
RDP
第8题:
Enables seamless access for remote access users to firewall enforcer protected resources.
Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.
Enables dynamic configuration synchronization across multiple MAG Series devices.
Provides a substitute for WAN clustering among geographically separated MAG Series devices.
Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.
第9题:
a set of rules that can be established and associated with the ingress and egress ports of the control plane
improves performance of the control plane by marking control plane packets with DSCPEF
protects the control plane on a router from DoS attacks
treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
provides the control plane with a separate token bucket
enhances security of the control plane by tunneling packets to and from the control plane
第10题:
protection against denial of service (DoS) attacks at infrastructure routers and switches
protection against known worm attacks in routers and switches
quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switches
quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switches
quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
第11题:
PW capabilities list
Message type
Assigned control connection ID
PW type
Remote session ID
Hostname
第12题:
The session ID is a 32-bit locally significant field used to identify the call on the destination or egresstunnel endport. The session ID will be negotiated by the control connection or statically defined if usingthe L2TP v3 data plane only
The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The controlconnection can negotiate this as an additional level of guarantee beyond the regular session ID lookupto make sure that a data message has been directed to the correct session or that any recently reusedsession ID will not be misdirected
The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnelendpoint. The cookie will be negotiated by the control connection or statically defined if using theL2TPv3 data plane only
The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field the control connection can negotiate this as an additional level of guarantee beyond the regular cookielookup to make sure that a data message has been directed to the correct session or that any recentlyreused cookie will not be misdirected.
第13题:
What are two benefits of control plane policing?()
第14题:
What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()
第15题:
What are three benefits of using chassis clustering?()
第16题:
Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)
第17题:
Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()
第18题:
using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
automatic reconfiguration s of the security devices based on current security threats
containment and control of security threats
application security
anti-x defense F- virtual firewall
第19题:
Ease of disk administration and maintenance
Load balancing across physical disks
Software RAID-1 data redundancy with double or triple mirrors
Automatic recovery of failed disks
第20题:
LDAP
ICMP
RTP
BGP
SSH
RDP
第21题:
provides advanced security such as hardware encryption acceleration
provides investment protection through increased modularity
comes equipped with at least one 1000-based TX interlace
contains integrated wireless access using the 802.11 g/b standard
contains integrated web-based management tools for easy configuration and maintenance
第22题:
XML
RIB
FIB
QoS
PFI
第23题:
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
第24题:
Provides stateful session failover for sessions.
Increases security capabilities for IPsec sessions.
Provides active-passive control and data plane redundancy.
Enables automated fast-reroute capabilities.
Synchronizes configuration files and session state