单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()AIt is applied only on the input interface of a router.BIt is applied only on the output interface of a router.CIt can be configured either on the input or output interface of a router.DIt cannot be configured on a router interface.EIt is configured under any routing protocol process.

单选题
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
A

It is applied only on the input interface of a router.

B

It is applied only on the output interface of a router.

C

It can be configured either on the input or output interface of a router.

D

It cannot be configured on a router interface.

E

It is configured under any routing protocol process.


参考解析

解析: 暂无解析

相关考题:

Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?() A. ip sa-validateB. ip split-horizonC. ip access-routesD. ip filter-options

By default, which two statements are true about export routing polices?() A. Export polices can evaluate only active routesB. Export polices can evaluate all routesC. Export polices can be applied to the forwarding tableD. Export polices can be applied to interfaces

Which of the following is the most effective technique to prevent source IPAddress spoofing?()A、 policy based routing (PBR)B、 unicast reverse path forwarding (uRPF)C、 lock and keyACLD、 RFC 1918filteringE、 IP source routing

Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.

Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A、It is applied only on the input interface of a router.B、It is applied only on the output interface of a router.C、It can be configured either on the input or output interface of a router.D、It cannot be configured on a router interface.E、It is configured under any routing protocol process.

What does the mac packet-classify command do when applied to an interface configuration?()A、 It enables MAC ACLs to be applied to only IP packets that enter the interface.B、 It enables MAC ACLs to be applied to only non-IP packets that enter the interface.C、 It enables MAC ACLs to be applied to all packets that enter the interface.D、 It enables MAC ACLs to be used for QoS settings.

For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would youconfigure uRPF on the uplink interface?()A、ip verify unicast source reachable-via anyB、ip verify unicast reverse-pathC、ip verify unicast reverse-path looseD、ip verify unicast reverse-path strict

Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()A、ip sa-validateB、ip split-horizonC、ip access-routesD、ip filter-options

By default, which two statements are true about export routing policies?()A、Export policies can evaluate only active routesB、Export policies can evaluate all routesC、Export policies can be applied to the forwarding tableD、Export policies can be applied directly to interfaces

Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would you configure uRPF on the uplink interface?()A、ip verify unicast source reachable-via anyB、ip verify unicast reverse-pathC、ip verify unicast reverse-path looseD、ip verify unicast reverse-path strict

Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)

What is true about access control on bridged and routed VLAN traffic? ()A、 Router ACLs can be applied to the input and output directions of a VLAN interface.B、 Bridged ACLs can be applied to the input and output directions of a VLAN interface.C、 Only router ACLs can be applied to a VLAN interface.D、 VLAN maps and router ACLs can be used in combination.E、 VLAN maps can be applied to a VLAN interface

Unicast Reverse Path Forwarding can perform all of these actions except which one?()A、examine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedB、check to see if any packet received at a router interface arrives on the best return pathC、combine with a configured ACLD、log its events,if you specify the logging options for the ACL entries used by the unicast rpf commandE、inspect IP packets encapsulated in tunnels, such as GRE

What is true about access control on bridged and routed VLAN traffic?()A、Router ACLs can be applied to the input and output directions of a VLAN interfaceB、Bridged ACLs can be applied to the input and output directions of a VLAN interfaceC、Only router ACLs can be applied to a VLAN interfaceD、VLAN maps and router ACLs can be used in combinationE、VLAN maps can be applied to a VLAN interfac

By default, which two statements are true about export routing polices?()A、Export polices can evaluate only active routesB、Export polices can evaluate all routesC、Export polices can be applied to the forwarding tableD、Export polices can be applied to interfaces

By default, which two statements are true about export routing policies?()A、Export policies can evaluate only active routes.B、Export policies can evaluate all routes.C、Export policies can be applied to the forwarding table.D、Export policies can be applied directly to interfaces

单选题Which of the following is the most effective technique to prevent source IPAddress spoofing?()A policy based routing (PBR)B unicast reverse path forwarding (uRPF)C lock and keyACLD RFC 1918filteringE IP source routing

单选题What does the mac packet-classify command do when applied to an interface configuration?()A It enables MAC ACLs to be applied to only IP packets that enter the interface.B It enables MAC ACLs to be applied to only non-IP packets that enter the interface.C It enables MAC ACLs to be applied to all packets that enter the interface.D It enables MAC ACLs to be used for QoS settings.

单选题Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()Aip sa-validateBip split-horizonCip access-routesDip filter-options

单选题Which of the following IOS features can prevent IP spoofing attacks?()APPP over EthernetBCisco Express forwardingCMPLS traffic EngineeringDIS-IS routingEUnicast Reverse Path Forwarding(uRPF)

多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

单选题Unicast Reverse Path Forwarding can perform all of these actions except which one?()Aexamine all packets received to make sure that the source addresses and source interfaces appear in the routing table and match the interfaces where the packets were receivedBcheck to see if any packet received at a router interface arrives on the best return pathCcombine with a configured ACLDlog its events,if you specify the logging options for the ACL entries used by the unicast rpf commandEinspect IP packets encapsulated in tunnels, such as GRE

多选题Which three statements about IOS Firewall configurations are true?()AThe IP inspection rule can be applied in the inbound direction on the secured interface.BThe IP inspection rule can be applied in the outbound direction on the unsecured interface.CThe ACL applied in the outbound direction on the unsecured interface should be an extended ACL.DThe ACL applied in the inbound direction on the unsecured interface should be an extended ACL.EFor temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.FFor temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

多选题What is true about access control on bridged and routed VLAN traffic? ()ARouter ACLs can be applied to the input and output directions of a VLAN interface.BBridged ACLs can be applied to the input and output directions of a VLAN interface.COnly router ACLs can be applied to a VLAN interface.DVLAN maps and router ACLs can be used in combination.EVLAN maps can be applied to a VLAN interface

多选题Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()AIt is used in multihome network scenarios.BIt can be used with BGP to mitigate DoS and DDoS.CIt does not need to have CEF enabled.DIt is enabled via the interface level command ip verify unicast reverse-path.EIt cannot be used with classification access lists.