单选题Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()AStateful firewallBProxy firewallCPacket filtering firewallDStateless firewall
单选题
Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()
A
Stateful firewall
B
Proxy firewall
C
Packet filtering firewall
D
Stateless firewall
参考解析
解析:
暂无解析
相关考题:
Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.
Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
The Cisco NAC Appliance is able to check which three items before allowing network access?()A、client antivirus software stateB、personal firewall settingsC、wireless cell bandwidth availabilityD、IOS versions for routers and switchesE、appropriate client patch management levelF、appropriate QoS settings for client application Answer:
Which information is stored in the stateful session flow table while using a stateful firewall?()A、the inside private IP address and the translated inside global IP addressB、the source and destination IP addresses, port numbers,TCP sequencing information, and additional flags for each TCP or UDP connection associated with a particular sessionC、the outbound and inbound access rules (ACL entries)D、all TCP and UDP header information only
The Cisco NAC Appliance is able to check which three items before allowing network access?()A、 client antivirus software stateB、 personal firewall settingsC、 wireless cell bandwidth availabilityD、 IOS versions for routers and switchesE、 appropriate client patch management levelF、 appropriate QoS settings for client application
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
Which of the following describes how to set the Read-only attribute on a folder?()A、Right-click the folder Properties Security tab select the username from the list Permissions clear the box labeled Read OKB、Open the folder Tool Folder Options General tab Read-only OKC、Open the Command Prompt type attrib r [drive:][path] EnterD、Open the Command Prompt type attrib +r [drive:][path] EnterE、Right-click the folder Properties General tab Attributes select Read-only OK
Which node type will use only NetBIOS broadcast requests using UDP broadcast?()A、 b-node (type 0x01)B、 p-node (type 0x02)C、 m-node (type 0x04)D、 h-node (type 0x08)
Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?()A、DNSB、FTPC、WINSD、IMAP4
After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?()A、Crossover cable with open pairsB、Crossover cableC、Rollover cableD、Straight-thru cable with open pairs
Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A、21B、443C、3389D、8080
A technician needs to check which ports are open in the Windows Firewall. Which of the following willallow the technician to view these settings?()A、netsh firewall show loggingB、ipconfig /allC、netsh firewall show stateD、arp -a
Which of the following interfaces is appropriate for an Ethernet adapter that is configured with an IEEE 802.3 frame type?()A、at0B、en0C、et0D、tr0
Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()A、Hot backupB、Online backupC、consistent backupD、incremental backupE、inconsistent backup
Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server. Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP
Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.
单选题Which node type will use only NetBIOS broadcast requests using UDP broadcast?()A b-node (type 0x01)B p-node (type 0x02)C m-node (type 0x04)D h-node (type 0x08)
单选题Which of the following interfaces is appropriate for an Ethernet adapter that is configured with an IEEE 802.3 frame type?()Aat0Ben0Cet0Dtr0
多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.
多选题You plan to take a closed database backup using operating system commands. Which three SHUTDOWN options are appropriate for this type of backup?()AABORTBNORMALCIMMEDIATEDTRANSACTIONAL
多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.
多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
单选题You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()Aresource access policiesBHost Enforcer policiesCsource IP enforcement policiesDIPsec enforcement policies
单选题Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A21B443C3389D8080
单选题You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()AHot backupBOnline backupCconsistent backupDincremental backupEinconsistent backup
单选题If you needed to transport traffic coming from multiple VLANs (connected between switches), and your CTO was insistent on using an open standard,which protocol would you use?()A802.11BBspanning-treeC802.1QDISLEVTPFQ.921