单选题Which is a benefit of implementing RFC 2827?()APrevents DoS from legimate, non-hostile end systemsBPrevents disruption of special services, such as Mobile IPCDefeats DoS Attacks which employ IPSource Address SpoofingDRestricts directed broadcasts at the ingress routerEAllows DHCP or BOOTP packets to reach the relay agents asappropriate
单选题
Which is a benefit of implementing RFC 2827?()
A
Prevents DoS from legimate, non-hostile end systems
B
Prevents disruption of special services, such as Mobile IP
C
Defeats DoS Attacks which employ IPSource Address Spoofing
D
Restricts directed broadcasts at the ingress router
E
Allows DHCP or BOOTP packets to reach the relay agents asappropriate
参考解析
解析:
暂无解析
相关考题:
A BGP router should use three export policies named add-communities, no-rfc1918-routes, andrejected-unwanted. Which export statement places the add-communities policy immediately before the default BGP policy?()A. export [add-communities no-rfc1918-routes rejected-unwanted];B. export [no-rfc1918-routes add-communities rejected-unwanted];C. export [add-communities rejected-unwanted no-rfc1918-routes];D. export [no-rfc1918-routes rejected-unwanted add-communities];
WhatareBCP38(BestCommonPractices38)/RFC2827IngressPacketFilteringPrinciples?() A.FilterSmurfICMPpackets.B.FilterasclosetothecoreaspossibleC.FilterasclosetotheedgeaspossibleD.FilteraspreciselyaspossibleE.Filterbothsourceanddestinationwherepossible
BCP(BestCommonPractices)38/RFC2827IngressandEgressPacketFilteringwouldhelpmitigatewhatclassificationofattack?() A.SniffingattackB.DenialofserviceattackC.PortScanattackD.ReconnaisanceattackE.Spoofingattack
WhenimplementingbestpracticesforIPSourceAddressSpoofingandDefeatingDenialofServiceAttackswithIPSourceAddressSpoofing,whatRFCiscommonlyusedtoprotectyournetwork?() A.RFC1149B.RFC3704C.RFC1918D.RFC2827
Whichis abenefitofimplementing RFC2827?() A.PreventsDoSfromlegimate,non-hostileendsystemsB.Preventsdisruptionofspecialservices,suchasMobileIPC.DefeatsDoSAttackswhichemployIPSourceAddressSpoofingD.RestrictsdirectedbroadcastsattheingressrouterE.AllowsDHCPorBOOTPpacketstoreachtherelayagentsasappropriate
The most commonly used locking level in implementing concurrency control is at which of the following levels?A.databaseB.tableC.recordD.field
What is a benefit of implementing a Cisco End-to-End Solution?()A、It maximizes the network securityB、It increase the cost of the equipmentC、It enables the network to work as a unified wholeD、It reduces the Cost of equipment
Which two encapsulation methods require that an 827 ADSL router be configured with a PPPusername and CHAP password?()A、PPPoE with the 827 configured as a bridgeB、PPPoE with the 827 configured as the PPPoE clientC、PPPoAD、RFC 1483 Bridged with the 827 configured as the PPPoE clientE、RFC 1482 Bridged with the 827 configured as a bridge
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()A、 RFC 1769 and mere publicationsB、 Real standards of RFC 1918C、 RFC 1669 real standards andmere publicationsD、 Real standards and mere publications RFC 1796E、 None of the above
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827
What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()A、Filter Smurf ICMP packets.B、Filter as close to the core as possibleC、Filter as close to the edge as possibleD、Filter as precisely as possibleE、Filter both source and destination where possible
BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()A、Sniffing attackB、Denial of service attackC、Port Scan attackD、Reconnaisance attackE、Spoofing attack
Which of these tables is used by an LSR to perform a forwarding lookup for a packet destined to an address within an RFC 4364 VPN?()A、CEFB、FIBC、LFIBD、IGP
Which is a benefit of implementing RFC 2827?()A、Prevents DoS from legimate, non-hostile end systemsB、Prevents disruption of "special services", such as Mobile IPC、Defeats DoS Attacks which employ IPSource Address SpoofingD、Restricts directed broadcasts at the ingress routerE、Allows DHCP or BOOTP packets to reach the relay agents asappropriate
Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.
Which of the following is a benefit of NAS over SAN?()A、Higher data integrityB、Lower cost of implementationC、Higher redundancyD、Increased performance
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()A、SSHB、WEPC、VPND、WPA
A global customer’s IT strategy is based upon two DS8000 systems and an N series gateway. They want to protect their business by implementing a disaster recovery solution. The storage specialist has recommended cascaded mirroring. Which of the following is the business benefit of cascaded replication()A、it is cost efficient, as a single N series or DS8000 can have its controllers split between the primary and secondary site and use semi- synchronousmirroring while using asynchronous mirroring to a third siteB、the second site acts as a repeater station so that greater geographical distances can be achievedC、ITprovides high availability together with disaster recovery by implementing Metro/Global Mirror across three geographically dispersed systemsD、it guarantees data protection by implementing two synchronous copies of the primary site data
Which technology/feature is designed to maximize the benefit of using SSD drives? ()A、Easy TierB、FlashCopyC、EncryptionD、Metro Mirror
Which of the following lists of items all require an HMC to function with POWER5?()A、Running AIX 5.3 Implementing HACMP Implementing Static LPARB、Implementing Advanced POWER Virtualization Running Linux Attaching RIO drawersC、Implementing VIO Server Implementing Dynamic LPAR Running with SMT turned "On"D、Running AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning
单选题When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()A RFC 1769 and mere publicationsB Real standards of RFC 1918C RFC 1669 real standards andmere publicationsD Real standards and mere publications RFC 1796E None of the above
单选题Which of the following lists of items all require an HMC to function with POWER5?()ARunning AIX 5.3 Implementing HACMP Implementing Static LPARBImplementing Advanced POWER Virtualization Running Linux Attaching RIO drawersCImplementing VIO Server Implementing Dynamic LPAR Running with SMT turned OnDRunning AIX and Linux on the same system Implementing CoD Implementing Micro-Partitioning
单选题Which of the following BEST describes a benefit of RAID 0?()AHigh fault toleranceBEase of failure recoveryCHigh performanceDNo configuration
单选题What is the benefit of implementing a Cisco end-to-end solution?()AIt enables the network to work as a unified wholeBIt maximizes the network securityCIt increases the cost of the equipmentDIt reduces the cost of the equipment
单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A RFC 1149B RFC 3704C RFC 1918D RFC 2827
单选题A BGP router should use three export policies named add-communities, no-rfc1918-routes, and rejected-unwanted. Which export statement places the add-communities policy immediately before the default BGP policy?()Aexport [add-communities no-rfc1918-routes ejected-unwanted];Bexport [no-rfc1918-routes add-communities rejected-unwanted];Cexport [add-communities rejected-unwanted no-rfc1918-routes];Dexport [no-rfc1918-routes rejected-unwanted add-communities];
多选题What are BCP 38 (Best Common Practices 38)/RFC 2827 Ingress Packet Filtering Principles?()AFilter Smurf ICMP packets.BFilter as close to the core as possibleCFilter as close to the edge as possibleDFilter as precisely as possibleEFilter both source and destination where possible
单选题BCP (Best Common Practices) 38/RFC 2827 Ingress and Egress Packet Filtering would help mitigate whatclassification of attack?()ASniffing attackBDenial of service attackCPort Scan attackDReconnaisance attackESpoofing attack