zones on which an attack might arrive
zones you want to protect from attack
interfaces on which an attack might arrive
interfaces you want to protect from attack
第1题:
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
A. then reject
B. then discard
C. then next filter
D. then silent-drop
第2题:
You will want two trees about ten feet apart, from _____ to suspend your tent.
(A) there (C) which
(B) them (D) where
选择D
可改写为you will want two tress about ten feet apart, to suspend your tent from.
只要有介词摆在空格之前,选项是which, them ,there ,where肯定是which
介词+which+动词不定式,整体做定语
第3题:
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()
第4题:
You want to allow all hosts on interface ge-0/0/0.0 to be able to ping the device’s ge-0/0/0.0 IP address.Where do you configure this functionality?()
第5题:
You want to create an out-of-band management zone and assign the ge-0/0/0.0 interface to that zone.From the [edit] hierarchy, which command do you use to configure this assignment?()
第6题:
Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()
第7题:
In which scenario will you use the Flashback Version Query feature?()
第8题:
from source-port
from source-address
from destination-address
from destination-port
第9题:
then reject
then discard
then next filter
then silent-drop
第10题:
set security zones management interfaces ge-0/0/0.0
set zones functional-zone management interfaces ge-0/0/0.0
set security zones functional-zone management interfaces ge-0/0/0.0
set security zones functional-zone out-of-band interfaces ge-0/0/0.0
第11题:
A
B
C
D
第12题:
[edit interfaces]
[edit security zones]
[edit system services]
[edit security interfaces]
第13题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
A. from source-port
B. from source-address
C. from destination-address
D. from destination-port
第14题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
第15题:
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
第16题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()
第17题:
Where do you configure SCREEN options?()
第18题:
In which case would you use a FULL OUTER JOIN?()
第19题:
You are the administrator of a network supporting Windows 2000 Professional computers. You want to configure Tom’s computer to run the Magnifier each time he logs on to his computer. Which two interfaces can you use?()
第20题:
Source TCP port
Source IP address
Destination TCP port
Destination IP address
第21题:
the log option for the particular SCREEN option
the permit option for the particular SCREEN option
the SCREEN option, because it does not drop traffic by default
the alarm-without-drop option for the particular SCREEN option
第22题:
SQL*Plus
iSQL*Plus
Management Server
Management Repository
Oracle Enterprise Manager 10g Database Control
第23题:
when you want to restore a table that has been dropped from the Recycle Bin
when you want to identify the transaction ID of the transaction that deleted some important records from a table
when you want to recover the schema of a dropped user
when you want to restore a dropped tablespace