多选题Which three statements are true about Cisco IOS Firewall?()AIt can be configured to block Java traffic.BIt can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.CIt can only examine network layer and transport layer information.DIt can only examine transport layer and application layer information.EThe inspection rules can be used to set timeout values for specified protocols.FThe ip inspect cbac-name command must be configured in global configuration mode.

多选题
Which three statements are true about Cisco IOS Firewall?()
A

It can be configured to block Java traffic.

B

It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.

C

It can only examine network layer and transport layer information.

D

It can only examine transport layer and application layer information.

E

The inspection rules can be used to set timeout values for specified protocols.

F

The ip inspect cbac-name command must be configured in global configuration mode.


参考解析

解析: 暂无解析

相关考题:

Which three statements about Syslog utilization are true?() A.Utilizing Syslog improves network performance.B.The Syslog server automatically notifies the network administrator of network problems.C.A Syslog server provides the storage space necessary to store log files without using router disk space.D.There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.E.Enabling Syslog on a router automatically enables NTP for accurate time stamping。F.A Syslog server helps in aggregation of logs and alerts.

Which of the following is true about the Cisco IOS-IPS functionality? ()A、 The signatures available are built into the IOS code.B、 Toupdate signatures youneed to install a new IOS imageC、 To activate new signatures you download a new Signature DefiitionFile (SDF) from Cisco’s web siteD、 Loading and enabling selected IPS signatures is user configurableE、 Cisco IOS onlyprovides Intrusion Detection functionalityF、 Cisco IOS-IPS requires a network module installed in your router running sensor software

Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()A、Cisco Firewall Services Module (FWSM)B、Cisco Secure Access Control Server (ACS)C、Cisco Private Internet Exchange (PIX) FirewallD、Cisco Internetwork Operating System (IOS) Firewall

Which three products reside on the UC500 platform?()A、Cisco Unified Communications ManagerExpressB、Cisco IOS FirewallC、Cisco UnifiedContact CenterD、Cisco IOSE、Cisco Unity ExpressF、Cisco UnifiedCallConnector

Which three statements about Syslog utilization are true?()A、Utilizing Syslog improves network performance.B、The Syslog server automatically notifies the network administrator of network problems.C、A Syslog server provides the storage space necessary to store log files without using router disk space.D、There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.E、Enabling Syslog on a router automatically enables NTP for accurate time stamping。F、A Syslog server helps in aggregation of logs and alerts.

Which three statements about firewall modes are correct? ()A、 A firewall in routed mode has one IP addressB、 A firewall in transparent mode has one IP addressC、 In routed mode, the firewall is considered to be a Layer 2 dewD、 In routed mode, the firewall is considered to be a Layer 3 deviceE、 In transparent mode, the firewall is considered to be a Layer 2 deviceF、 In transparent mode, the firewall is considered to be a Layer 3 device

Which of these statements is true about ssids configured in cisco adu?()A、ssids are not case-sensitive.B、ssids must be listed in the same order in the adu as they are in the access point.C、a maximum of three ssids may be configured.D、ssids may have a maximum of 16 characters.

Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()A、 onboard VPN acceleratorB、 events correlation and proactive responseC、 high-performance AIM VPN modulesD、 virtual firewallE、 Cisco lOS Firewall and lOS IPSF、 transparent firewall

Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

Which two statements about the Cisco Nexus 1000V VSM are true?()A、It performs switching decisions and forwarding for the VEMB、It can be run on a virtual machineC、It can be used for remote VEM switching Iine cards

Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

XYZ LTD is concerned about the security in the perimeter of the network. Which three Cisco products can you offer to XYZ LTD?()A、Integrated Services RoutersB、Firewall AppliancesC、Cisco Unified CallManagerD、Multilayer switch with enhanced imageE、Cisco UnityF、VPN Concentrators

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

The Cisco NAC Appliance is able to check which three items before allowing network access?()A、client antivirus software stateB、personal firewall settingsC、wireless cell bandwidth availabilityD、IOS versions for routers and switchesE、appropriate client patch management levelF、appropriate QoS settings for client application Answer:

Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.

The Cisco NAC Appliance is able to check which three items before allowing network access?()A、 client antivirus software stateB、 personal firewall settingsC、 wireless cell bandwidth availabilityD、 IOS versions for routers and switchesE、 appropriate client patch management levelF、 appropriate QoS settings for client application

Which three statements about subqueries are true? ()A、Asinglerowsubquerycanretrieveonlyonecolumnandonerow.B、Asinglerowsubquerycanretrieveonlyonerowbutmanycolumns.C、Amultiplerowsubquerycanretrievemultiplerowsandmultiplecolumns.D、Amultiplerowsubquerycanbecomparedusingthe";;";operator.E、AsinglerowsubquerycanusetheINoperator.F、Amultiplerowsubquerycanusethe";=";operator.

多选题Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()AA custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.BAn optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.CCustom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.DOnly the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.EThe outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.FThe SDM provides a basic, intermediate, and advanced firewall wizard.

多选题Which three statements about firewall modes are correct? ()AA firewall in routed mode has one IP addressBA firewall in transparent mode has one IP addressCIn routed mode, the firewall is considered to be a Layer 2 dewDIn routed mode, the firewall is considered to be a Layer 3 deviceEIn transparent mode, the firewall is considered to be a Layer 2 deviceFIn transparent mode, the firewall is considered to be a Layer 3 device

单选题After making some network changes you power off and then power on your Cisco router. What sequence of events occurs when a router is powered up?()APerform POST, locate configuration statements, apply configuration statements, locate Cisco IOS software, and load Cisco IOS software.BLocate Cisco IOS software, load Cisco IOS software, locate configuration statements, apply configuration statements, and perform POST.CTest software routines, POST, load configuration files, load Cisco IOS software, test Cisco IOS software.DPOST, locate Cisco IOS software, load the Cisco IOS software, locate configuration statements, and apply configuration statements.ELoad and test IOS, load configuration files, test software routines, POST.

多选题Which three statements about IOS Firewall configurations are true?()AThe IP inspection rule can be applied in the inbound direction on the secured interface.BThe IP inspection rule can be applied in the outbound direction on the unsecured interface.CThe ACL applied in the outbound direction on the unsecured interface should be an extended ACL.DThe ACL applied in the inbound direction on the unsecured interface should be an extended ACL.EFor temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.FFor temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

多选题Which of the following is true about the Cisco IOS-IPS functionality? ()AThe signatures available are built into the IOS code.BToupdate signatures youneed to install a new IOS imageCTo activate new signatures you download a new Signature DefiitionFile (SDF) from Cisco’s web siteDLoading and enabling selected IPS signatures is user configurableECisco IOS onlyprovides Intrusion Detection functionalityFCisco IOS-IPS requires a network module installed in your router running sensor software

多选题What are three features of the Cisco IOS Firewall feature set?()Anetwork-based application recognition (NBAR)Bauthentication proxyCstateful packet filteringDAAA servicesEproxy serverFIPS

单选题Which of these statements is true about ssids configured in cisco adu?()Assids are not case-sensitive.Bssids must be listed in the same order in the adu as they are in the access point.Ca maximum of three ssids may be configured.Dssids may have a maximum of 16 characters.

多选题The Cisco AutoQoS feature is being used throughout the Company VOIP network.  Which three  statements about this feature are true?()AThe mls qos global configuration command must be entered before configuring AutoQoS.BCEF must be enabled.CThe no auto qos voip command is used to disable Cisco AutoQos and revoke all  configurations generated by Cisco AutoQos.DCDP must be enabled.ESNMP must be enabled.

多选题Which three statements about subqueries are true? ()AAsinglerowsubquerycanretrieveonlyonecolumnandonerow.BAsinglerowsubquerycanretrieveonlyonerowbutmanycolumns.CAmultiplerowsubquerycanretrievemultiplerowsandmultiplecolumns.DAmultiplerowsubquerycanbecomparedusingthe;;;operator.EAsinglerowsubquerycanusetheINoperator.FAmultiplerowsubquerycanusethe;=;operator.

多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL