A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation
A traditional router is better suited than a firewall device for which function?()
- A、VPN establishment
- B、packet-based forwarding
- C、stateful packet processing
- D、Network Address Translation
相关考题:
阅读下面的短文,回答问题 [When an IP packet arrives at a router, generally the router looks at the destination address of the packet, and forwards the packet to one of its network interfaces. The forwarding decision is usually done by looking up the destination address from another data structure called a forwarding table. The forwarding table is created by the router using the routing table and possible routing policies existing in the router. The router then creates a table where it lists which networks are accessible through which of the routers network interfaces. An IP router looks at every IP packet individually and does the forwarding decision on a packet-by-packet basis. If something changes in the routers routing table, a packet can take a different route from a preceding packet even if it has the same destination.] From the paragraph above,we can see that the router ( ) a forwarding table according to the routing table and possible routing policies existing in the router. When an IP packet arrives at a router, the ( ) part of packet is normally checked by the router. An IP router checks every IP Packet individually and makes the forwarding decision based on ( ).A.is generating B.generate C.is generated D.generates A.forwarding table B.network interfaces C.routing policies D.destination address A.the destination address and network interfaces B.forwarding table and network interfaces C.the destination address and forward table D.routing policies and routing table
Which three functions are provided by the Junos OS for security platforms?()(Choose three.) A. VPN establishmentB. stateful ARP lookupsC. Dynamic ARP inspectionD. Network Address TranslationE. inspection of packets at higher levels (Layer 4 and above)
A traditional router is better suited than a firewall device for which function? () A. VPN establishmentB. packet-based forwardingC. stateful packet processingD. network address translation
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.) A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router
A router receives a packet on interface 172.16.45.66/26. The source IP of the packet is 172.16.45.127/26 and the destination is 172.16.46.191/26.How will the router handle the packet?() A. The destination is a host on another subnet, so the router will not forward the packet.B. The destination is a host on the same subnet, so the router will forward the packet.C. The destination is a broadcast address, so the router will not forward the packet.D. The destination is a network address, so the router will forward the packet.
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?() A. fewer devices to manageB. moderate-to-high scalabilityC. stateful inspection of decrypted VPN trafficD. increased bandwidth with additional interfacesE. decreased complexity as traffic is filtered from the firewall
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?() A. RADIUS or LDAPB. an internal router running EIGRPC. Reverse Route Injection and OSPF or RIPv2D. the VPN appliance to be deployed in line with the firewall
We have already covered the topic of network addresses. The first(71) in a block (in classes A,B,and C) defines the network address. In classes A,B,and C,if the hostid is all ls, the address is called a direct broadcast address. It is used by a.() to send a packet to all hosts in a specific network. All hosts will accept a packet having this type of destination address. Note that this address can be used only as a (73)address in an lP packet. Note also that this special address also reduces the number of available hostid for each netid in classes A,B,and C.In classes A,B,and C,an address with all Is for the netid and hostid (32 bits) defines a(74) address in the current network.A host that wants to send a message to every other host can use this address as a destination address in an IP packet. However,a router will block a packet having this type ofaddress to confine the broadcasting to the (75) network. Note that this address belongs to class E.A.router B.switchC.huB.D.firewall
Traditional IP packet forwarding analyzes the( )IP address contained in the network layer header of each packet as the packet travels from its source to its final destination.A router analyzes the destination IP address independently at each hop in the network.Dynamic( )protocols or static configuration builds the database needed to analyze the destination IP address(the routing table).The process of implementing traditional IP routing also is called hop-by-hop destination-based( )routing.Although successful,and obviously widely deployed,certain restrictions,which have been realized for some time,exist for this method of packet forwarding that diminish is(请作答此空).New techniques are therefore required to address and expand the functionality of an IP-based network infrastructure.This first chapter concentrates on identifying these restrictions and presents a new archiecture,known as multiprotocol( )switching,that provides solutions some of these restrictions.A.reliabilityB.flexibilityC.stabilityD.capability
Traditional IP packet forwarding analyzes the( )IP address contained in the network layer header of each packet as the packet travels from its source to its final destination.A router analyzes the destination IP address independently at each hop in the network.Dynamic(请作答此空)protocols or static configuration builds the database needed to analyze the destination IP address(the routing table).The process of implementing traditional IP routing also is called hop-by-hop destination-based( )routing.Although successful,and obviously widely deployed,certain restrictions,which have been realized for some time,exist for this method of packet forwarding that diminish is( ).New techniques are therefore required to address and expand the functionality of an IP-based network infrastructure.This first chapter concentrates on identifying these restrictions and presents a new archiecture,known as multiprotocol( )switching,that provides solutions some of these restrictions.A.routingB.forwardingC.transmissionD.management
Which three functions are provided by JUNOS Software for security platforms?()A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall
Easy VPN operates in two modes. Although Client Mode has advantages, there are environments where it should not be used.()A、Teleworker devices must be accessed from the central site (server, printers).B、IP addressing is simplified.C、The Teleworker LAN is a transit networking for routing.D、An Enterprise application does not function with Network Address Translation.E、The Teleworker router is an MPLS PE node.
When should you enable Network Address Translation Transparency (NAT-T) on the Teleworker?()A、when a router between the Teleworker router and the head-end VPN router is doing NAT/pNAT and does not support IPSec pass-through B、when the Teleworker router itself is doing NAT/pNATC、alwaysD、never
Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()A、Stateful firewallB、Proxy firewallC、Packet filtering firewallD、Stateless firewall
Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.
Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A、 CiscoWorks Security Device Management Center (SD/MC)B、 Security Device Manager (SDM)C、 Adaptive Security Device Manager (ASDM)D、 CiscoWorks VMS/Management Center (VMS/MC)
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall
给了两段documentation里的描述,问这个时候发哪种类型的ICMP包。 The interface on which the packet comes into the router is the same interface on which the packet gets routed out. The subnet or network of the source IP address is on the same subnet or network of the next-hop IP address of the routed packet.
Which three functions are provided by the Junos OS for security platforms?()(Choose three.)A、VPN establishmentB、stateful ARP lookupsC、Dynamic ARP inspectionD、Network Address TranslationE、inspection of packets at higher levels (Layer 4 and above)
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)A、rate limiting of ICMPB、RADIUS authorizationsC、source address validationD、stateful firewall on the router
You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()A、 Configure VPN1 as a DHCP Relay Agent.B、 Configure VPN1 to assign IP Address by using DHCP server.C、 Configure VPN1 to have a static pool of IP Address from the network address of 131.107.1.0/24.D、 Configure VPN1 to have a static pool of IP Address from the network address of 192.168.1.0/24.E、 Configure the perimeter firewall to allow inbound DHCP traffic to be passed to VPN1.F、 Configure the interval firewall to allow DHCP broadcasts to be forwarded from the external network to the internal network.
Your network contains an Active Directory domain named contoso.com. The domain contains a server named Server1 that runs Windows Server 2012 R2. You create a new inbound rule by using Windows Firewall with Advanced Security. You need to configure the rule to allow Server1 to accept unsolicited inbound packets that are received through a network address translation (NAT) device on the network. Which setting in the rule should you configure?()A、Edge traversalB、Authorized computersC、Interface typesD、Remote IP address
单选题A traditional router is better suited than a firewall device for which function? ()AVPN establishmentBpacket-based forwardingCstateful packet processingDnetwork address translation
问答题给了两段documentation里的描述,问这个时候发哪种类型的ICMP包。 The interface on which the packet comes into the router is the same interface on which the packet gets routed out. The subnet or network of the source IP address is on the same subnet or network of the next-hop IP address of the routed packet.
单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()ARADIUS or LDAPBan internal router running EIGRPCReverse Route Injection and OSPF or RIPv2Dthe VPN appliance to be deployed in line with the firewall
单选题Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A CiscoWorks Security Device Management Center (SD/MC)B Security Device Manager (SDM)C Adaptive Security Device Manager (ASDM)D CiscoWorks VMS/Management Center (VMS/MC)