单选题A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()AreflexiveBextendedCstandardDdynamic
单选题
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
A
reflexive
B
extended
C
standard
D
dynamic
参考解析
解析:
暂无解析
相关考题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?() A. Network managementB. Protocol analyzerC. Network monitoringD. System diagnostic
You work as a network engineer at TestKing.com. You are required to allow establishment of a Telnet session with a router TestKingC.Which set command must be configured?() A.B.C.D.E.F.
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?() A. reflexiveB. extendedC. standardD. dynamic
● When a large packet wants to travel through a network whose MTU is too small, one solution is to allow routers to break up the packet into (). ()A. messages B. frames C. fragments D. bits
IP routing protocols, such as OSPF and Enhanced EIGRP, are used primarily in network designs that contain entry and exit points to the network from service providers. What is a common trait of IP routing protocols?() A、 They add needed overhead in smaller deployments.B、 They are essential for optimum and redundant forwarding.C、 They are used primarily in larger network designs,to support different networks and single entry and exit points.D、 They are usually necessary in smaller deployments.
Which three practices are important to the implementation of a DiffServ QoS architecture?()A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.
You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()A、EBGP multihop will need to be configured for this to work.B、This should work with normal BGP peering, with no additional configuration on the BGP speakers or the firewall.C、The BGP protocol port must be opened on the firewallD、There is no way to make BGP work across a firewall.
A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()A、reflexiveB、extendedC、standardD、dynamic
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session
As an experienced Network Engineer, you are required to characterize an existing CIS network. In such a situation, what is the last step to take?()A、Perform a network audit.B、Form an impression about the network.C、Use traffic analysis to augment organizational input.D、Prepare and add to the network description.
You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. Toyour surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this?()A、IEEE 802.1QB、IEEE 802.10C、Misconfigured NICD、User configurationE、All of the above
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
A technician temporarily needs an additional network connection in their office to test a newworkstation. Which of the following is the BEST solution to add a temporary network connection?()A、Install a small network switchB、Use port mirroring on the switchC、Split the pairs of the existing jackD、Install a CSU/DSU
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()A、NIPSB、HoneypotC、DMZD、NIDS
What are the steps required to perform a Preservation install on a server?()A、Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade, Preservation install for the install type, and allow upgrade to run.B、Shut down the server and perform a network boot from a local NIM server. Select Preservation install for the install type, and allow upgrade to run.C、Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade, Preservation install for the install type, and allow for upgrade to run.D、Re-boot the server and NFS mount the bos images from a local NIM server. Run smit install. Select Preservation install for the install type, and allow upgrade to run.
During the installation of a cluster, the non-IP network failed. The cause was a connector that was Not properly secured. The customer wants a better notification method in the event that the non-IP network fails in the future. How could customization of the cluster be accomplished?() A、 Customize the node up event script to send an email to the operator.B、 Have HACMP send mail when the non-IP network fails by customizing the RG_MMOVE event script.C、 Change the network module to be slower so that a temporary failure of the non-IP network would not report an error.D、 Use snmp or clinfo to monitor the status of the non-IP network and dispatch some type of warning message.
What are the steps required to perform a Preservation install on a server?()A、Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade,Preservation install for the install type,and allow upgrade to runB、Shut down the server and perform a network boot from a local NIM server.Select Presevation install for the install type,and allow upgrade to runC、Shutdown the server and boot it into SMS.Select SMS menu option OS Upgrade,Presevation install for the install type,and allow for upgrade to runD、Re-boot the server and NFS mount the bos images from a local NIM server.Run smit install.Select Presevation install for the install type,and allow upgrade to run
The database is currently open and the temp03.dbf tempfile belonging to the default temporary tablespace TEMP has been corrupted. What steps should you take to recover from this tempfile loss in an efficient manner?()A、Allow the database to continue running, drop the TEMP tablespace, and then re-create it with new tempfilesB、Shut down the database, restore and recover the tempfile from backup, and then open the database with RESETLOGSC、Allow the database to continue running, take the TEMP tablespace offline, drop the missing tempfile, and then create a new tempfileD、Allow the database to continue running, add a new tempfile to TEMP tablespace with a new name, and drop the tempfile that has been corrupted.
Your network consists of a single Active Directory domain. The network is located on the 172.16.0.0/23 subnet. The company hires temporary employees. You provide user accounts and computers to the temporaryem ployees. The temporary employees receive computers that are outside the Active Directory domain. The temporary employees use their computers to connect to the network by using wired connections andwireless connections. The company’s security policy specifies that the computers connected to the network must have the latest updates for the operating system. You need to plan the network’s security so that it complies with the company 's security policy. What should you include in your plan?()A、Implement a Network Access Protection (NAP) strategy for the 172.16.0.0/23 subnet.B、Create an extranet domain within the same forest. Migrate the temporary employees user accounts to the extranet domain. Install the necessary domain resources on the 172.16.0.0/23 subnet.C、Move the temporary employees user accounts to a new organizational unit (OU). Create a new Group Policy object (GPO) that uses an intranet Microsoft Update server. Link the new GPO tothe new OU.D、Create a new subnet in a perimeter network. Relocate the wireless access point to the perimeter network. Require authentication through a VPN server before allowing access to the internal resources.
All servers and client computers in your company are configured to use WINS for name resolution. The internal network is separated from a perimeter network (also known as DMZ) by a third-party firewall. Firewall rules do not allow name resolution between the internal network and the perimeter network. You move a Windows Server 2003 server named Server1 to the perimeter network. You need to ensure that all computers on the internal network can connect to Server1 by name. What should you do?()A、 Create an LMHOSTS file on Server1.B、 Create a static WINS entry for Server1.C、 Configure Server1 to use Broadcast (B-node) mode.D、 Configure Server1 to use Peer-to-Peer (P-node) mode.
You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A、 Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B、 Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C、 Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D、 Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
单选题A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()AWEP encryptionBChannel rotationCDisable SSIDDWPA encryption
单选题IP routing protocols, such as OSPF and Enhanced EIGRP, are used primarily in network designs that contain entry and exit points to the network from service providers. What is a common trait of IP routing protocols?()A They add needed overhead in smaller deployments.B They are essential for optimum and redundant forwarding.C They are used primarily in larger network designs,to support different networks and single entry and exit points.D They are usually necessary in smaller deployments.
单选题A network administrator wants to permit Telnet traffic initiated from the address book entry the10net in azone called UNTRUST to the address book entry Server in a zone called TRUST.However, the administrator does not want the server to be able to initiate any type of traffic from the TRUSTzone to the UNTRUST zone. Which configuration would correctly accomplish this task?()A AB BC CD D
单选题You are a network adminstrator for your company. You install an intranet application on three Windows Server 2003 computers. You configure the servers as a Network Load Balancing cluster. You configure each server with two network adapters. One network adapter provides client computers access to the servers. The second network adapter is for cluster communications. Cluster communications is on a separate network segment. The network team wants to reduce the cluster’s vulnerability to attack. These servers need to be highly available. The network team decides that the Network Load Balancing cluster needs to filter IP ports. The team wants the cluster to allow only the ports that are required for the intranet application. You need to implement filtering so that only the intranet application ports are available on the cluster. You need to achieve this goal by using the minimum amount of administrative effort. What should you do? ()A Use Network Load Balancing Manager to configure port rules. Allow only the intranet application ports on the cluster IP address.B Use TCP/IP filtering on each server. Configure only the intranet application ports on the network adapter that provides client computers access to the servers.C Use TCP/IP filtering on each server. Configure only the intranet application ports on both of the network adapters.D Configure Routing and Remote Access on each server. Use Routing and Remote Access input filters to allow only the intranet application ports on the network adapter that provides client computers access to the servers.
单选题You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. Toyour surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this?()AIEEE 802.1QBIEEE 802.10CMisconfigured NICDUser configurationEAll of the above
单选题You’re a network administer and you issue the command (show port 3/1) on an Ethernet port. To your surprise you notice a non-zero entry in the ’Giants’ column. What could be the cause of this? ()A IEEE 802.1QB IEEE 802.10C Misconfigured NICD User configurationE All of the above