单选题What is true about a Pre-Block ACLconfigured when setting up your sensor toperform IP Blocking?()A The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensorB The blocking ACL entries generated by the sensor override the Pre-Block ACL entriesC The Pre-Block ACL entries override the blocking ACL entries generated by the sensorD The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensorE You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor

单选题
What is true about a Pre-Block ACLconfigured when setting up your sensor toperform IP Blocking?()
A

 The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensor

B

 The blocking ACL entries generated by the sensor override the Pre-Block ACL entries

C

 The Pre-Block ACL entries override the blocking ACL entries generated by the sensor

D

 The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensor

E

 You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor


参考解析

解析: 暂无解析

相关考题:

What is true about updates through a view? () A. You cannot update a view with group functions.B. When you update a view group functions are automatically computed.C. When you update a view only the constraints on the underlying table will be in effect.D. When you update a view the constraints on the views always override the constraints on the underlying tables.

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?() A.show ip access-listB.show access-listC.list ip interfaceD.show interfaceE.show ip interface

Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?() A.A level 5 password is not setB.The vty password is missingC.The console password is missingD.An ACL is blocking Telnet access

Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()A、A level 5 password is not setB、The vty password is missingC、The console password is missingD、An ACL is blocking Telnet access

What is true about a Pre-Block ACLconfigured when setting up your sensor toperform IP Blocking?()A、 The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensorB、 The blocking ACL entries generated by the sensor override the Pre-Block ACL entriesC、 The Pre-Block ACL entries override the blocking ACL entries generated by the sensorD、 The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensorE、 You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor

Which two statements best describe spanning-tree BPDU processing for a blocking port?()A、BPDUs that enter a blocking port are discarded.B、BPDUs that enter a blocking port are processed.C、Loopguard puts an interface into a loop-inconsistent state when BPDUs stop being received on a blocking port.D、BPDUs are only processed on forwarding ports.

After applying a new ACL on a device, its CPU utilization rose significantly and many messages startingwith "%SEC-6-IPACCESSLOG" appeared on the Syslog server.What can be done to resolve this situation?()A、Increase memory allocation for ACLs.B、Remove all entries from the ACL and use a single permit ip any any statement.C、Remove the log keyword from each ACL entry.D、Reboot the device after the ACL has been applied.

What is true about Unicast RPF in strict mode?()A、It works well with a multihomed environment.B、It will inspect IP packets that are encapsulated in tunnels, such as GRE,LT2P,or PPTP.C、uRPF is performed within the CEF switching path.D、There might be a problem with DHCP as Unicast RPF is blocking packets with a 0.0.0.0 sourceaddress.

You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time. How would you accomplish this task?()A、Set metric thresholdB、Implement Database Resource ManagerC、Enable resumable timeout for user sessionsD、Add directives to Automatic Database Diagnostic Monitor (ADDM)

When is an IPSec SA built on the Teleworker Router?()A、when the router is booted upB、when the router administratively does a no shutdown" on the IPSec SA C、when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up D、when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately

Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()A、show ip access-listB、show access-listC、list ip interfaceD、show interfaceE、show ip interface

What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()A、The best match of the ACL entries will be used for granularity of control.B、They use source IP information for matching operations.C、They use source and destination IP information for matching operations.D、They use source IP information along with protocol-type information for finer granularity of control.

What is true about updates through a view? ()A、You cannot update a view with group functions.B、When you update a view group functions are automatically computed.C、When you update a view only the constraints on the underlying table will be in effect.D、When you update a view the constraints on the views always override the constraints on the underlying tables.

While setting up the thresholds for tablespace space usage metrics for one of your tablespaces, you define the critical threshold as 60% and warning threshold as 75%. What would be the result of this setting?()A、It would result in an error because the warning threshold cannot be more than the critical threshold.B、The warning threshold is ignored and alerts would be generated when space usage exceeds the critical threshold.C、The critical threshold is ignored and alerts would be generated when space usage exceeds the warning threshold.D、Both threshold values are used and alerts are generated when space usage exceeds the respective threshold values.

Which two statements about Flashback Query are true?()A、It is generated by using the redo log files. B、It helps in row-level recovery from user errors.C、It can be performed to recover ALTER TABLE statements D、It fails when undo data pertaining to the transaction is overwritten.E、The database has to be opened with the resetlogs option after performing Flashback Query.

Which statement is true about "sticky" load balancing for Clusters? ()A、The "clientip" setting does not apply to clusters, it only pertains to a Forwarder.B、When set to "clientip" it uses the client's IP address to bind the client to a particular target server.C、When set to "clientip" it allows a DX sticky cookie to be sent to and stored by the client based on the IP address.D、When set to "clientip" it ensures that all subsequent requests are directed to the same client that made the initial request.

单选题While setting up the threshold for tablespace space usage metrics for one of your tablespaces, you define the critical threshold as 60% and warning threshold as 75%. What would be the result of this setting?()A It would result in an error because the warning threshold cannot be more than the critical threshold.B The warning threshold is ignored and alerts would be generated when space usage exceeds the critical threshold.C The critical threshold is ignored and alerts would be generated when space usage exceeds the warning threshold.D Both threshold values are used and alerts are generated when space usage exceeds the respective threshold values.

单选题Refer to the exhibit,a network administrator cannot establish a telnet session with the indicated router.What is the cause of this failure?()AA level 5 password is not setBThe vty password is missingCThe console password is missingDAn ACL is blocking Telnet access

单选题When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()Ashow ip access-listBshow access-listClist ip interfaceDshow interfaceEshow ip interface

单选题What is true of standard access control lists when applied to an interface to control inbound or outbound traffic?()AThe best match of the ACL entries will be used for granularity of control.BThey use source IP information for matching operations.CThey use source and destination IP information for matching operations.DThey use source IP information along with protocol-type information for finer granularity of control.

单选题After applying a new ACL on a device, its CPU utilization rose significantly and many messages starting with "%SEC-6-IPACCESSLOG" appeared on the Syslog server. What can be done to resolve this situation?()AIncrease memory allocation for ACLs.BRemove all entries from the ACL and use a single permit ip any any statement.CRemove the log keyword from each ACL entry.DReboot the device after the ACL has been applied.

单选题What is true about Unicast RPF in strict mode?()AIt works well with a multihomed environment.BIt will inspect IP packets that are encapsulated in tunnels, such as GRE,LT2P,or PPTP.CuRPF is performed within the CEF switching path.DThere might be a problem with DHCP as Unicast RPF is blocking packets with a 0.0.0.0 sourceaddress.

单选题You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time.  How would you accomplish this task?()A Set metric thresholdB Implement Database Resource ManagerC Enable resumable timeout for user sessionsD Add directives to Automatic Database Diagnostic Monitor (ADDM)

单选题You plan to control idle sessions that are blocking other sessions from performing transactions. Your requirement is to automatically terminate these blocking sessions when they remain idle for a specified amount of time. How would you accomplish this task?()ASet metric thresholdBImplement Database Resource ManagerCEnable resumable timeout for user sessionsDAdd directives to Automatic Database Diagnostic Monitor (ADDM)

单选题In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()A the destination was manually added to the block listB the malware category is set to blocking modeC the transaction was blocked because of application or object propertiesD the transaction was manually blocked by the administrative user