Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP

Which of the following would restrict traffic from a specific host to a network?()

  • A、MIBs
  • B、NAS
  • C、ACL
  • D、SMTP

相关考题:

Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

Click the Exhibit button.host_a is in subnet_a and host_b is in subnet_b.Given the configuration shown in the exhibit, which statement is true about traffic from host_a to host_b?() A. DNS traffic is denied.B. Telnet traffic is denied.C. SMTP traffic is denied.D. Ping traffic is permitted.

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? () A. user nameB. password lengthC. certificateD. Host Checker

Which of the following would be used to optimize network performance and increase bandwidth availability?() A. Packet analysisB. QoSC. Traffic shapingD. Fault tolerance

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

Which of the following devices would need to be configured to block specific ports and protocols from entering the network?() A. BridgeB. FirewallC. Port replicatorD. Gateway

Whichofthefollowingwouldrestricttrafficfromaspecifichosttoanetwork?() A.MIBsB.NASC.ACLD.SMTP

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

Which of the following traffic types would a network layer firewall be unable to filter?() A.SMTP trafficB.ICMP messagesC.HTTP trafficD.Email sender verification

You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN:access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 anyWhat will the effect of this access list be?()A. All traffic will be allowed to out of E0 except FTP traffic.B. FTP traffic from 192.168.1.22 to any host will be blocked.C. FTP traffic from 192.168.1.9 to any host will be blocked.D. All traffic will be prevented from leaving E0.E. All FTP traffic to network 192.168.1.9/29 from any host will be blocked.

Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices

Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }A、DNS traffic is denied.B、HTTP traffic is denied.C、FTP traffic is permitted.D、SMTP traffic is permitted.

Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A、Inadequate RAMB、Slow processorC、PCI busD、Excessive network traffic

Which of the following would be used to optimize network performance and increase bandwidth availability?()A、Packet analysisB、QoSC、Traffic shapingD、Fault tolerance

Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A、SwitchB、RepeaterC、HubD、WAP

Which of the following would be the BEST way to restrict access to the WAP from certain clients?()A、Disable DHCP serverB、Enable WEP encryptionC、Disable SSID broadcastD、Enable MAC filtering

A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

Which of the following traffic types would a network layer firewall be unable to filter?()A、SMTP trafficB、ICMP messagesC、HTTP trafficD、Email sender verification

Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

A host is to be part of a very small private network, which will never be connected to any other networks.  Which of the following name resolution schemes would be the easiest to implement?()A、DNSB、NISC、DHCPD、etc/hosts file

You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()A、user nameB、password lengthC、certificateD、Host Checker

Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.A、DNS traffic is denied.B、Telnet traffic is denied.C、SMTP traffic is denied.D、Ping traffic is permitted

单选题Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A Inadequate RAMB Slow processorC PCI busD Excessive network traffic

单选题Which of the following traffic types would a network layer firewall be unable to filter?()ASMTP trafficBICMP messagesCHTTP trafficDEmail sender verification

单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()AHoneynetBHoneypotCVulnerability scannerDNetwork based IDS

单选题Which of the following would restrict traffic from a specific host to a network?()AMIBsBNASCACLDSMTP