A. ICMP Echo
B. VoIP (RTP)
C. IPX
D. SNMP
第1题:
Which three statements accurately describe IOS Firewall configurations?()
第2题:
Which of the following IOS features can prevent IP spoofing attacks?()
第3题:
How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()
第4题:
Which of the following is the BEST support channel for server software and hardware?()
第5题:
A two-node cluster has both a single TCP/IP heartbeat and a single non-IP serial heartbeat. TheService Level Agreement regarding the speed of cluster fallover has been updated,and Fast Disk Takeover will be implemented to meet the new Service Level Agreement. Which of the following should be implemented to increase the reliability of Fast Disk Takeover?()
第6题:
Explore the ramification of the change before implementation.
Determine the service level agreement in place before implementation.
Review the equipment disposal procedures and policies before implementation.
Notify all staff members of the planned system outage before implementation.
第7题:
reader
author
manager
designer
第8题:
View
Catalog Table
Stored Procedure
Global Temporary Table
第9题:
SLA sender target can be an IP host
SLA sender sends a probe packet and a response probe packet
SLA sender sends a probe packet
SLA sender target must be a router
SLA sender target can be an IP SLA responder
第10题:
SLA responder knows type of operation, the port used, and duration.
SLA responder inserts in and out timestamps in the packet payload.
SLA sender and responder use the IP SLA Control Protocol to communicate with each other before
SLA sender and responder communication can be encrypted.
SLA sender and responder communication can be authenticated with MD5.
第11题:
Load balancer
Proxy server
Content filter
Quality of service
第12题:
Online troubleshooting tools
Service Level Agreement (SLA)
Vendor website
Support forums
第13题:
Which three of these statements about the IP service level agreement (SLA) sender are true? ()
第14题:
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()
第15题:
Which of the following is the MOST important consideration before making a change to a server?()
第16题:
Which of the following can transmit block level storage over Ethernet?()
第17题:
john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()
第18题:
Online troubleshooting tools
Service Level Agreement (SLA)
Vendor website
Support forums
第19题:
ICMP Echo
VoIP (RTP)
IPX
SNMP
第20题:
control plane policing
data plane policing
network-based application recognition (NBAR)
service plane policing
management plane policing
第21题:
Disk should be mirrored across separate storage enclosures.
Disk heartbeats should be added over multiple disk adapters.
Disk major and minor numbers should be set as unique across nodes.
Disk adapter queue_depth should be increased from the default values.
第22题:
It can be used to block bulk encryption attacks
It can be used to protect against denial of service attacks
Traffic originating from the router is considered trusted, so it is not inspected
Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently
Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session
第23题:
The IP inspection rule can be applied in the inbound direction on the secured interface
The IP inspection rule can be applied in the outbound direction on the unsecured interface
The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.
For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL