You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which ha

题目
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()

A. It resembles a Layer 2 bridge.

B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.

C. Inline interfaces which have no IP addresses cannot be detected.

D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.


相似考题
更多“You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device() ”相关问题
  • 第1题:

    You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()

    • A、They do not receive unique IP addresses.
    • B、RADIUS or LDAP is required.
    • C、They are assigned addresses from the internal DHCP pool.
    • D、Their traffic appears to originate from the originating host network.

    正确答案:A

  • 第2题:

    You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()

    • A、Encryption
    • B、Bandwidth limits
    • C、Minimal signal loss
    • D、No EMI

    正确答案:C,D

  • 第3题:

    You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()

    • A、Content storage networking
    • B、Network optimization
    • C、Network management
    • D、Network security

    正确答案:D

  • 第4题:

    Which two statements describe the functions and operations of IDS and IPS systems?()

    • A、A network administrator entering a wrong password would generate a true-negative alarm.
    • B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.
    • C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
    • D、Cisco IDS works inline and stops attacks before they enter the network.
    • E、Cisco IPS taps the network traffic and responds after an attack.
    • F、Profile-based intrusion detection is also known as "anomaly detection".

    正确答案:B,F

  • 第5题:

    You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()

    • A、Flex Links
    • B、loop-free U
    • C、looped square
    • D、looped triangle

    正确答案:B

  • 第6题:

    You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() 

    • A、From the Device Manager, open the wireless network adapter properties and click Advanced. 
    • B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. 
    • C、From the Wireless Network Connection Properties, select View Wireless Networks. 
    • D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network. 

    正确答案:D

  • 第7题:

    多选题
    The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()
    A

    Control traffic between an access point and a controller is encrypted within LWAPP.

    B

    Data traffic between an access point and a controller is encrypted within LWAPP.

    C

    Layer 3 mode packets are transmitted in TCP frames.

    D

    Data traffic between an access point and a controller is encapsulated within LWAPP.

    E

    VLAN tagging and QoS markings are applied at the access point.


    正确答案: A,D
    解析: 暂无解析

  • 第8题:

    单选题
    You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()
    A

    ensure a loop-free topology

    B

    protect against user-side loops

    C

    support business applications

    D

    risk of lost connectivity without STP


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
    A

    Network management

    B

    Network optimization

    C

    Network security

    D

    Content storage networking


    正确答案: C
    解析: 暂无解析

  • 第10题:

    多选题
    In which two locations in an enterprise network can an IPS sensor be placed?()
    A

    bridging VLANs on two switches

    B

    bridging two VLANs on one switch

    C

    between two Layer 2 devices with trunking

    D

    between two Layer 2 devices without trunking

    E

    between a Layer 2 device and a Layer 3 device with trunking


    正确答案: B,D
    解析: 暂无解析

  • 第11题:

    单选题
    You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?()
    A

    From the Device Manager, open the wireless network adapter properties and click Advanced. 

    B

    From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. 

    C

    From the Wireless Network Connection Properties, select View Wireless Networks. 

    D

    From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network. 


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()
    A

    Encryption

    B

    Bandwidth limits

    C

    Minimal signal loss

    D

    No EMI


    正确答案: D,C
    解析: 暂无解析

  • 第13题:

    Which two of these are characteristics of an IPS device?()

    • A、 passively listens to network traffic
    • B、 is an active device in the traffic path
    • C、 has a permissive interface that is used to monitor networks
    • D、 traffic arrives on one IPS interface and exits on another

    正确答案:B,D

  • 第14题:

    Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()

    • A、You may use Cisco Network Assistant to set up the initial configuration
    • B、You must use CLI for initial configuration
    • C、You may use either CLI or CAN for configuration
    • D、You may make a direct connection to the PC from any point on the switch
    • E、You may only make a direct connection from the port with the flashing green LED to the PC

    正确答案:A,E

  • 第15题:

    You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()

    • A、It resembles a Layer 2 bridge.
    • B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
    • C、Inline interfaces which have no IP addresses cannot be detected.
    • D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

    正确答案:A,C

  • 第16题:

    In which two locations in an enterprise network can an IPS sensor be placed? ()

    • A、 bridging VLANs on two switches
    • B、 bridging two VLANs on one switch
    • C、 between two Layer 2 devices with trunking
    • D、 between two Layer 2 devices without trunking
    • E、 between a Layer 2 device and a Layer 3 device with trunking

    正确答案:C,D

  • 第17题:

    The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()

    • A、 Control traffic between an access point and a controller is encrypted within LWAPP.
    • B、 Data traffic between an access point and a controller is encrypted within LWAPP.
    • C、 Layer 3 mode packets are transmitted in TCP frames.
    • D、 Data traffic between an access point and a controller is encapsulated within LWAPP.
    • E、 VLAN tagging and QoS markings are applied at the access point.

    正确答案:A,D

  • 第18题:

    Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()

    • A、From Credential Manager, modify the generic credentials.
    • B、From Credential Manager, modify the Windows credentials.
    • C、From Network and Sharing Center, turn on Network discovery.
    • D、From Network and Sharing Center, modify the wireless network connection settings.

    正确答案:D

  • 第19题:

    多选题
    Refer to the exhibit. Which three statements correctly describe Network Device A?()
    A

    With a network wide mask of 255.255.255.128, each interface does not require an IP address.

    B

    With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.

    C

    With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.

    D

    With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.

    E

    With a network wide mask of 255.255.254.0, each interface does not require an IP address.


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    多选题
    You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()
    A

    VPN

    B

    InfiniBand

    C

    SCSI over IP

    D

    Remote Direct Memory Access


    正确答案: B,C
    解析: 暂无解析

  • 第21题:

    多选题
    In which two locations in an enterprise network can an IPS sensor be placed?()
    A

    bridging VLANs on two switches

    B

    bridging two VLANs on one switch

    C

    between two Layer 2 devices withtrunking

    D

    between two Layer 2 devices withouttrunking

    E

    between a Layer 2 device and a Layer 3 device withtrunking


    正确答案: D,E
    解析: 暂无解析

  • 第22题:

    多选题
    Which two of these are characteristics of an IPS device?()
    A

    passively listens to network traffic

    B

    is an active device in the traffic path

    C

    has a permissive interface that is used to monitor networks

    D

    traffic arrives on one IPS interface and exits on another


    正确答案: B,C
    解析: 暂无解析

  • 第23题:

    单选题
    You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()
    A

     They do not receive unique IP addresses.

    B

     RADIUS or LDAP is required.

    C

     They are assigned addresses from the internal DHCP pool.

    D

     Their traffic appears to originate from the originating host network.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()
    A

    They do not receive unique IP addresses.

    B

    RADIUS or LDAP is required.

    C

    They are assigned addresses from the internal DHCP pool.

    D

    Their traffic appears to originate from the originating host network.


    正确答案: B
    解析: 暂无解析