单选题Which attribute can influence inbound traffic flows from a neighboring AS?()AAggregatorBLocal preferenceCAtomic aggregateDMultiple exit discriminator

单选题
Which attribute can influence inbound traffic flows from a neighboring AS?()
A

Aggregator

B

Local preference

C

Atomic aggregate

D

Multiple exit discriminator


参考解析

解析: 暂无解析

相关考题:

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

Which attribute can influence inbound traffic flows from a neighboring AS?() A. AggregatorB. Local preferenceC. Atomic aggregateD. Multiple exit discriminator

which BGP attributes will influence inbound flow?

Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

What are two characteristics of the SLB One-arm mode? ()A、 It is not as common as bridge modeB、 The MSFC is not directly connected to the CSMC、 Outbound traffic from servers may need to be directed by PBR or CSNAT to the CSMD、 The SLB is moved to a position where selected inbound and outbound server traffic goesthrough the SLBE、 The CSM statically routes inbound server traffic to the aggregation switch FWSM, then to the connected server subnet

On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()A、SMTPB、DNSC、FTPD、TelnetE、HTTPF、POP3

Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

Which three mechanisms are used to secure management traffic from outside IPS sensors?()A、secure tunnelsB、a separate management VLANC、secure VLANs to isolate sensorsD、an out-of-band path around the firewallE、asymmetric traffic flows to isolate sensorsF、private VLANs to put all sensors on isolated ports

Which BGP attribute can be used to influence inbound traffic flow?()A、cluster IDB、WeightC、MEDD、local preferenceE、aggregate

Users can define policy to control traffic flow between which two components?()A、from a zone to the device itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

A firewall filter is applied as an input filter on a transit interface. What three types of traffic will this affect? ()A、inbound traffic transiting the routerB、outbound traffic transiting the routerC、traffic destined to the Routing EngineD、traffic destined to the interface address on which the filter is applied

You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()A、 VPN TrafficB、 DNS TrafficC、 LDAP TrafficD、 HTTP TrafficE、 HTTPS TrafficF、 Traffic from the network address of 192.168.10/24

You are designing a strategy to allow users to gain VPN access to the internal network.  What should you do?()A、 Allow all inbound VPN traffic to pass through the internal firewall and the perimeter firewall.B、 Allow all inbound VPN traffic to pass through the perimeter firewall only.C、 Allow all VPN traffic from the source IP address of 131.107.1.14 to pass through the internal firewall.D、 Allow all VPN traffic from the source IP address of 191.168.1.0/24 to pass through the perimeter firewall.

单选题Which BGP attribute can be used to influence inbound traffic flow?()Acluster IDBWeightCMEDDlocal preferenceEaggregate

单选题Set of current is().Aits velocity in knotsBdirection from which it flowsCestimated currentDdirection toward which it flows

多选题On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()ASMTPBDNSCFTPDTelnetEHTTPFPOP3

问答题which BGP attributes will influence inbound flow?

单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

多选题You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()AThe endpoints can use agentless access.BEncrypted traffic flows between the endpoint and the enforcer.CEncrypted traffic flows between the endpoint and the protected resourceDThe endpoints can use the Odyssey Access Client.

单选题As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()ANetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.BNetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.CNetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.DNetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

单选题Set of current is().Avelocit in knotBirection from which it flowsCestimated currentDdirection toward which it flows

多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

多选题You need to identify the types of inbound traffic that should pass through the perimeter firewall while maintaining the security of the network.  Which inbound traffic should be allowed? ()AVPN TrafficBDNS TrafficCLDAP TrafficDHTTP TrafficEHTTPS TrafficFTraffic from the network address of 192.168.10/24

多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

单选题Traffic separation schemes established by the International Maritime Organization().Aprovide routing and scheduling procedures to reduce shipping delaysBprovide traffic patterns in congested areas,so that vessels can operate without having a separate lookoutCprovide inbound and outbound lanes to promote the safe flow of vessel trafficDprohibit vessels carrying hazardous cargoes from entering waters that are environmentally sensitive