Which two of these multicast deployments are most susceptible to attacks from unknown sources?()A.ASMB.BiDirPIMC.PIM-SMRPD.RP-SwitchoverE.SourceSpecificMulticast

题目
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A.ASM

B.BiDirPIM

C.PIM-SMRP

D.RP-Switchover

E.SourceSpecificMulticast


相似考题
参考答案和解析
参考答案:A, B
更多“Which two of these multicast deployments are most susceptible to attacks from unknown sources?() ”相关问题
  • 第1题:

    Which two multicast protocol statements are true?()

    A. Sparse mode multicast uses a pull model to send multicast traffic to where it is requested

    B. Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic

    C. Dense mode multicast requires explicit join messa ges from their members

    D. Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows

    E. The primary use of sparse mode multicast is for test labs and router performance testing


    参考答案:A, B

  • 第2题:

    Which two statements are true about the rendezvous poin t (RP) in a multicast network?()

    • A、The multicast sources must register with the RP to form the multicast distribution tree.
    • B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).
    • C、The multicast receivers must register with the RP to form the multicast distribution tree.
    • D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).
    • E、An RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).
    • F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

    正确答案:D,F

  • 第3题:

    Which two statements are tru e about the rendezvous point (RP) in a multicast network?()

    • A、The multicast sources must register with the RP to form the multicast distribution tree
    • B、An RP is required only in networks running Protocol Independent Multicast dense mode ( PIM DM)
    • C、The multicast receivers must register with the RP to form the multicast distribution tree
    • D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM)
    • E、An RP is required only in networks running Pro tocol Independent Multicast sparse - dense mode (PIM - SDM)
    • F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP

    正确答案:D,F

  • 第4题:

    Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

    • A、 ASM
    • B、 BiDir PIM
    • C、 PIM-SM RP
    • D、 RP-Switchover
    • E、 Source Specific Multicast

    正确答案:A,B

  • 第5题:

    Which two are characteristics of an IPv6 multicast address?()

    • A、First (most significant ) octet is FF in hex
    • B、Starts with a prefix of FE80 to FEBF in hex
    • C、Starts with a prefix of FECO to FEFF in hex
    • D、Second octet contains a 4-bit multicast scope field
    • E、Last 64 bit contains the modified MAC address of the Ethernet interface
    • F、Is allocated from the unicast address space

    正确答案:A,D

  • 第6题:

    Which of the following cables is the MOST susceptible to interference?()

    • A、Fiber
    • B、Coax
    • C、UTP
    • D、STP

    正确答案:C

  • 第7题:

    多选题
    Which two types of attacks are considered to be denial of service?() (Choose two.)
    A

    zombie agents

    B

    SYN flood

    C

    IP packet fragments

    D

    WinNuke


    正确答案: B,C
    解析: 暂无解析

  • 第8题:

    多选题
    Which two statements are true about the rendezvous poin t (RP) in a multicast network?()
    A

    The multicast sources must register with the RP to form the multicast distribution tree.

    B

    An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).

    C

    The multicast receivers must register with the RP to form the multicast distribution tree.

    D

    An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).

    E

    An RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).

    F

    To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.


    正确答案: C,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two Cisco antennas provide better isolation from RF sources that might be located behindthe antennas?()
    A

    AIR-ANT3213

    B

    AIR-ANT2465P-R

    C

    AIR-ANT1949

    D

    AIR-ANT5160V-R


    正确答案: D,C
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements are true about the rendezvo us point (RP) in a multicast network?()
    A

    The multicast sources must register with the RP to form the multicast distribution tree.

    B

    An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).

    C

    The mu lticast receivers must register with the RP to form the multicast distribution tree.

    D

    An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).

    E

    An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).

    F

    To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    多选题
    Which two multicast protocol statements are true? (Choose two.)  ()
    A

    Dense mode multicast requires explicit join messages from their members.

    B

    Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the  unwanted traffic.

    C

    Sparse mode multicast uses a pull model to send multicast traffic to where it is requested.

    D

    Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows.

    E

    The primary use of sparse mode multicast is for test labs and router performance testing.


    正确答案: A,D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()
    A

    jitter

    B

    delay

    C

    PoE

    D

    bandwidth

    E

    packet loss


    正确答案: E,A
    解析: 暂无解析

  • 第13题:

    Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

    • A、ASM
    • B、BiDirPIM
    • C、PIM-SMRP
    • D、RP-Switchover
    • E、SourceSpecificMulticast

    正确答案:A,B

  • 第14题:

    Apart from interdomain multicast routing, what else is MSDP used for?()

    • A、Source Specific Multicast and IGMPv2
    • B、Announcing multicast sources to BGP speakers
    • C、Anycast RP
    • D、Intradomain multicast routing

    正确答案:C

  • 第15题:

    Which two networking infrastructure characteristics are most likely to distinguish video requirements (such as Cisco TelePresence) from voice requirements?()

    • A、jitter
    • B、delay
    • C、PoE
    • D、bandwidth
    • E、packet loss

    正确答案:C,D

  • 第16题:

    Which two benefits does the Juniper DX provide?() (Choose two.)

    • A、It compresses all images.
    • B、It protects servers from DDoS attacks.
    • C、It protects servers from SynFlood attacks.
    • D、It loads all content from web servers to flash.

    正确答案:B,C

  • 第17题:

    Which two statements are true about the rendezvo us point (RP) in a multicast network?()

    • A、The multicast sources must register with the RP to form the multicast distribution tree.
    • B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).
    • C、The mu lticast receivers must register with the RP to form the multicast distribution tree.
    • D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).
    • E、An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).
    • F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

    正确答案:D,F

  • 第18题:

    多选题
    Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)
    A

    rate limiting of ICMP

    B

    RADIUS authorizations

    C

    source address validation

    D

    stateful firewall on the router


    正确答案: A,C
    解析: 暂无解析

  • 第19题:

    多选题
    Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
    A

    ASM

    B

    BiDir PIM

    C

    PIM-SM RP

    D

    RP-Switchover

    E

    Source Specific Multicast


    正确答案: B,E
    解析: 暂无解析

  • 第20题:

    多选题
    Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
    A

    ASM

    B

    BiDirPIM

    C

    PIM-SMRP

    D

    RP-Switchover

    E

    SourceSpecificMulticast


    正确答案: A,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two benefits does the Juniper DX provide?() (Choose two.)
    A

    It compresses all images.

    B

    It protects servers from DDoS attacks.

    C

    It protects servers from SynFlood attacks.

    D

    It loads all content from web servers to flash.


    正确答案: A,D
    解析: 暂无解析

  • 第22题:

    多选题
    In Multicast VPN (MVPN) implementations, which two of the following statements are regarding the DefaultMDT Group?()
    A

    It is used for PIM control traffic

    B

    It is optionally configured for a high bandwidth multicast source to reduce multicast traffic replication to uninterested PE routers

    C

    Within the VPF configuration in the PE router, multiple Default MDT groups are configured so each VPF can support multiple multicast sources

    D

    There is a reduced multicast state in the MPLS core P routers

    E

    When multicast traffic exceeds a certain configured threshold, traffic from the Data MDT is switched to the Default MDT to conserve bandwidth


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    多选题
    Which two multicast protocol statements are true?()
    A

    Sparse mode multicast uses a pull model to send multicast traffic to where it is requested

    B

    Dense mode multicast uses a push model to flood traffic throughout the network and then prunes the unwanted traffic

    C

    Dense mode multicast requires explicit join messa ges from their members

    D

    Sparse mode uses reverse path forwarding (RPF) to prune off redundant flows

    E

    The primary use of sparse mode multicast is for test labs and router performance testing


    正确答案: C,E
    解析: 暂无解析