参考答案和解析
参考答案:B, E
更多“What are two security appliances that can be installed in a network (Choose two.)()。 ”相关问题
  • 第1题:

    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies (Choose two.)()。

    A.copier

    B.microwave oven

    C.toaster

    D.cordless phone

    E.IP phone

    F.AM radio


    参考答案:B, D

  • 第2题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第3题:

    What are two security appliances that can be installed in a network? ()

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第4题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第5题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第6题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第7题:

    As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)

    • A、cost savings
    • B、product variety
    • C、well-tested interoperability
    • D、regular upgrade process

    正确答案:A,C

  • 第8题:

    多选题
    Refer to the exhibit. Which two statements are correct? (Choose two.)()
    A

    All six routes will be installed in the routing table.

    B

    Two routes will be installed in the routing table.

    C

    Four routes will be installed in the routing table.

    D

    All the routes were redistributed into BGP from an IGP.

    E

    All the routes were originated by BGP with the network command.


    正确答案: C,B
    解析: 暂无解析

  • 第9题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: E,D
    解析: 暂无解析

  • 第10题:

    多选题
    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()
    A

    copier

    B

    microwave oven

    C

    toaster

    D

    cordless phone

    E

    IP phone

    F

    AM radio


    正确答案: F,E
    解析: 暂无解析

  • 第11题:

    多选题
    What are two security appliances that can be installed in a network? ()
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: E,F
    解析: 暂无解析

  • 第12题:

    多选题
    What are two security appliances that can be installed in a network (Choose two.)()。
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: A,E
    解析: 暂无解析

  • 第13题:

    What are some of the advantages of using a router to segment the network (Choose two.)()。

    A.Filtering can occur based on Layer 3 information.

    B.Broadcasts are eliminated.

    C.Routers generally cost less than switches.

    D.Broadcasts are not forwarded across the router.

    E.Adding a router to the network decreases latency.


    参考答案:A, D

  • 第14题:

    What functions do routers perform in a network (Choose two.)()。

    • A、packet switching
    • B、access layer security
    • C、path selection
    • D、VLAN membership assignment
    • E、bridging between LAN segments
    • F、microsegmentation of broadcast domai

    正确答案:A,C

  • 第15题:

    Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()

    • A、copier
    • B、microwave oven
    • C、toaster
    • D、cordless phone
    • E、IP phone
    • F、AM radio

    正确答案:B,D

  • 第16题:

    What are two advantages of BGP route aggregation?() (Choose two.)

    • A、It can reduce routing table size.
    • B、It allows for optimal route selection.
    • C、It can reduce the number of routing updates.
    • D、It always shortens the attribute list for the aggregated route.

    正确答案:A,C

  • 第17题:

    What are some of the advantages of using a router to segment the network? (Choose two.)()

    • A、Filtering can occur based on Layer 3 information.
    • B、Broadcasts are eliminated.
    • C、Routers generally cost less than switches.
    • D、Broadcasts are not forwarded across the router.
    • E、Adding a router to the network decreases latency.

    正确答案:A,D

  • 第18题:

    What are two security appliances that can be installed in a network? (Choose two.)()  

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第19题:

    Which two parameters are configured in IPsec policy? ()(Choose two.)

    • A、mode
    • B、IKE gateway
    • C、security proposal
    • D、Perfect Forward Secrecy

    正确答案:C,D

  • 第20题:

    多选题
    Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
    A

    protocol list

    B

    MIME

    C

    block list

    D

    extension


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    多选题
    What functions do routers perform in a network? (Choose two.)()
    A

    packet switching

    B

    access layer security

    C

    path selection

    D

    VLAN membership assignment

    E

    bridging between LAN segments

    F

    microsegmentation of broadcast domains


    正确答案: F,C
    解析: 暂无解析

  • 第22题:

    多选题
    What are two components of the Junos software architecture? ()(Choose two.)
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: D,A
    解析: 暂无解析

  • 第23题:

    多选题
    The network administrator must complete the connection between the RTA of the XYZ Company and the service provider. To accomplish this task, which two devices could be installed at the customer site to provide a connection through the local loop to the central office of the provider (Choose two.)()。
    A

    WAN switch

    B

    PVC

    C

    ATM switch

    D

    multiplexer

    E

    CSU/DSU

    F

    modem


    正确答案: D,A
    解析: 暂无解析