多选题What are three benefits of using chassis clustering?()AProvides stateful session failover for sessions.BIncreases security capabilities for IPsec sessions.CProvides active-passive control and data plane redundancy.DEnables automated fast-reroute capabi

题目
多选题
What are three benefits of using chassis clustering?()
A

Provides stateful session failover for sessions.

B

Increases security capabilities for IPsec sessions.

C

Provides active-passive control and data plane redundancy.

D

Enables automated fast-reroute capabilities.

E

Synchronizes configuration files and session state


相似考题

2.Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?()A、The session ID is a 32-bit locally significant field used to identify the call on the destination or egresstunnel endport. The session ID will be negotiated by the control connection or statically defined if usingthe L2TP v3 data plane onlyB、The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The controlconnection can negotiate this as an additional level of guarantee beyond the regular session ID lookupto make sure that a data message has been directed to the correct session or that any recently reusedsession ID will not be misdirectedC、The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnelendpoint. The cookie will be negotiated by the control connection or statically defined if using theL2TPv3 data plane onlyD、The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field the control connection can negotiate this as an additional level of guarantee beyond the regular cookielookup to make sure that a data message has been directed to the correct session or that any recentlyreused cookie will not be misdirected.

参考答案和解析
正确答案: E,A
解析: 暂无解析
更多“多选题What are three benefits of using chassis clustering?()AProvides stateful session failover for sessions.BIncreases security capabilities for IPsec sessions.CProvides active-passive control and data plane redundancy.DEnables automated fast-reroute capabi”相关问题
  • 第1题:

    Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()

    • A、LDAP
    • B、ICMP
    • C、RTP
    • D、BGP
    • E、SSH
    • F、RDP

    正确答案:B,D,E

  • 第2题:

    Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three ofthese belong to the data plane?()

    • A、XML
    • B、RIB
    • C、FIB
    • D、QoS
    • E、PFI

    正确答案:B,D,E

  • 第3题:

    What are three facts control plane policing? ()

    • A、a set of rules that can be established and associated with the ingress and egress ports of the control plane
    • B、improves performance of the control plane by marking control plane packets with DSCPEF
    • C、protects the control plane on a router from DoS attacks
    • D、treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
    • E、provides the control plane with a separate token bucket
    • F、enhances security of the control plane by tunneling packets to and from the control plane

    正确答案:A,C,D

  • 第4题:

    What are three benefits of IF-MAP Federation?()

    • A、Enables seamless access for remote access users to firewall enforcer protected resources.
    • B、Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.
    • C、Enables dynamic configuration synchronization across multiple MAG Series devices.
    • D、Provides a substitute for WAN clustering among geographically separated MAG Series devices.
    • E、Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.

    正确答案:A,B,E

  • 第5题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,B,C

  • 第6题:

    What are three benefits of using ASM?() 

    • A、 Ease of disk administration and maintenance
    • B、 Load balancing across physical disks
    • C、 Software RAID-1 data redundancy with double or triple mirrors
    • D、 Automatic recovery of failed disks

    正确答案:A,B,C

  • 第7题:

    多选题
    Which three protocols should be explicitly managed by using Control Plane Policing on an Internet borderrouter?()
    A

    LDAP

    B

    ICMP

    C

    RTP

    D

    BGP

    E

    SSH

    F

    RDP


    正确答案: B,E
    解析: 暂无解析

  • 第8题:

    多选题
    What are three benefits of IF-MAP Federation?()
    A

    Enables seamless access for remote access users to firewall enforcer protected resources.

    B

    Scales a Junos Pulse Access control Service deployment beyond the capacity of a single cluster.

    C

    Enables dynamic configuration synchronization across multiple MAG Series devices.

    D

    Provides a substitute for WAN clustering among geographically separated MAG Series devices.

    E

    Shares non-localized DP integration and IPsec configuration information between multiple Junos Pulse Access Control Service instances.


    正确答案: C,B
    解析: 暂无解析

  • 第9题:

    多选题
    What are three facts control plane policing? ()
    A

    a set of rules that can be established and associated with the ingress and egress ports of the control plane

    B

    improves performance of the control plane by marking control plane packets with DSCPEF

    C

    protects the control plane on a router from DoS attacks

    D

    treats the control plane as a separate entity with its own ingress (input) and egress (output) ports

    E

    provides the control plane with a separate token bucket

    F

    enhances security of the control plane by tunneling packets to and from the control plane


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    What are two benefits of control plane policing?()
    A

    protection against denial of service (DoS) attacks at infrastructure routers and switches

    B

    protection against known worm attacks in routers and switches

    C

    quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switches

    D

    quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switches

    E

    quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches


    正确答案: A,D
    解析: 暂无解析

  • 第11题:

    多选题
    Which three attribute-value pairs (AVPs) must be present in L2TPv3 ICRQ messages? ()
    A

    PW capabilities list

    B

    Message type

    C

    Assigned control connection ID

    D

    PW type

    E

    Remote session ID

    F

    Hostname


    正确答案: A,E
    解析: 暂无解析

  • 第12题:

    多选题
    Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?()
    A

    The session ID is a 32-bit locally significant field used to identify the call on the destination or egresstunnel endport. The session ID will be negotiated by the control connection or statically defined if usingthe L2TP v3 data plane only

    B

    The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The controlconnection can negotiate this as an additional level of guarantee beyond the regular session ID lookupto make sure that a data message has been directed to the correct session or that any recently reusedsession ID will not be misdirected

    C

    The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnelendpoint. The cookie will be negotiated by the control connection or statically defined if using theL2TPv3 data plane only

    D

    The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field the control connection can negotiate this as an additional level of guarantee beyond the regular cookielookup to make sure that a data message has been directed to the correct session or that any recentlyreused cookie will not be misdirected.


    正确答案: D,A
    解析: 暂无解析

  • 第13题:

    What are two benefits of control plane policing?()

    • A、protection against denial of service (DoS) attacks at infrastructure routers and switches
    • B、 protection against known worm attacks in routers and switches
    • C、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switches
    • D、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switches
    • E、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches

    正确答案:A,D

  • 第14题:

    What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()

    • A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
    • B、 automatic reconfiguration s of the security devices based on current security threats
    • C、 containment and control of security threats
    • D、 application security
    • E、 anti-x defense F- virtual firewall

    正确答案:C,D,E

  • 第15题:

    What are three benefits of using chassis clustering?()

    • A、Provides stateful session failover for sessions.
    • B、Increases security capabilities for IPsec sessions.
    • C、Provides active-passive control and data plane redundancy.
    • D、Enables automated fast-reroute capabilities.
    • E、Synchronizes configuration files and session state

    正确答案:A,C,E

  • 第16题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by AH?() (Choose three.)

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,C,E

  • 第17题:

    Which three mechanisims support the forwarding plane of a Layer 3 VPN in JUNOS software? ()

    • A、MPLS LSP
    • B、ATM tunnel
    • C、GRE tunnel
    • D、IPSEC tunnel
    • E、L2TPv3 session

    正确答案:A,C,D

  • 第18题:

    多选题
    What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()
    A

    using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks

    B

    automatic reconfiguration s of the security devices based on current security threats

    C

    containment and control of security threats

    D

    application security

    E

    anti-x defense F- virtual firewall


    正确答案: E,C
    解析: 暂无解析

  • 第19题:

    多选题
    What are three benefits of using ASM?()
    A

    Ease of disk administration and maintenance

    B

    Load balancing across physical disks

    C

    Software RAID-1 data redundancy with double or triple mirrors

    D

    Automatic recovery of failed disks


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    多选题
    Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()
    A

    LDAP

    B

    ICMP

    C

    RTP

    D

    BGP

    E

    SSH

    F

    RDP


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()
    A

    provides advanced security such as hardware encryption acceleration

    B

    provides investment protection through increased modularity

    C

    comes equipped with at least one 1000-based TX interlace

    D

    contains integrated wireless access using the 802.11 g/b standard

    E

    contains integrated web-based management tools for easy configuration and maintenance


    正确答案: E,D
    解析: 暂无解析

  • 第22题:

    多选题
    Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three ofthese belong to the data plane?()
    A

    XML

    B

    RIB

    C

    FIB

    D

    QoS

    E

    PFI


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
    A

    The ability to detect and prevent malicious traffic.

    B

    The ability to associate security breaches with a specific user.

    C

    Converged management of network and security events, network flow data, and identity information.

    D

    Consistent device management across administrative realms.


    正确答案: D,C
    解析: 暂无解析

  • 第24题:

    多选题
    What are three benefits of using chassis clustering?()
    A

    Provides stateful session failover for sessions.

    B

    Increases security capabilities for IPsec sessions.

    C

    Provides active-passive control and data plane redundancy.

    D

    Enables automated fast-reroute capabilities.

    E

    Synchronizes configuration files and session state


    正确答案: A,B
    解析: 暂无解析