多选题Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()AIt can be used to block bulk encryption attacksBIt can be used to protect against denial of service attacksCTraffic originating from the router is considered trusted, so it is not inspectedDBased upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyETemporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

多选题
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()
A

It can be used to block bulk encryption attacks

B

It can be used to protect against denial of service attacks

C

Traffic originating from the router is considered trusted, so it is not inspected

D

Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanently

E

Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session


参考解析

解析: 暂无解析

相关考题:

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.) A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router

Which two statements are correct about firewall filters in the Junos OS?() A. Firewall filters are stateless.B. Firewall filters are used to control routing information that is exchanged between devices.C. Firewall filters are used to control traffic passing through the device.D. Firewall filters can only be applied to traffic entering the device.

Which two statements about the Cisco Aironet Desktop Utility (ADU) are true() A.The Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.B.The Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.C.The Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.D.The Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?() A.show inventoryB.show flash:filesysC.dirflash:include chassisD.show diagE.show controllers

Which two statements are true regarding the USING clause in table joins?()A、It can be used to join a maximum of three tables B、It can be used to restrict the number of columns used in a NATURAL join C、It can be used to access data from tables through equijoins as well as nonequijoins D、It can be used to join tables that have columns with the same name and compatible data types

Which two statements about the Cisco Nexus 1000V VSM are true?()A、It performs switching decisions and forwarding for the VEMB、It can be run on a virtual machineC、It can be used for remote VEM switching Iine cards

Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()A、show inventoryB、show flash:filesysC、dirflash:include chassisD、show diagE、show controllers

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

Which three statements are true about Cisco IOS Firewall?()A、It can be configured to block Java traffic.B、It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.C、It can only examine network layer and transport layer information.D、It can only examine transport layer and application layer information.E、The inspection rules can be used to set timeout values for specified protocols.F、The ip inspect cbac-name command must be configured in global configuration mode.

Which two statements regarding symmetric key encryption are true?() (Choose two.)A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption.

Which two statements regarding asymmetric key encryption are true?()A、The same key is used for encryption and decryption.B、It is commonly used to create digital certificate signatures.C、It uses two keys: one for encryption and a different key for decryption.D、An attacker can decrypt data if the attacker captures the key used for encryption

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)A、rate limiting of ICMPB、RADIUS authorizationsC、source address validationD、stateful firewall on the router

多选题Which two statements regarding asymmetric key encryption are true?()AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption

多选题Which two privileged mode cisco ios commands can be used to determine a cisco router chassis serial number?()Ashow inventoryBshow flash:filesysCdirflash:include chassisDshow diagEshow controllers

多选题Which two statements are true regarding the USING clause in table joins?()AIt can be used to join a maximum of three tablesBIt can be used to restrict the number of columns used in a NATURAL joinCIt can be used to access data from tables through equijoins as well as nonequijoinsDIt can be used to join tables that have columns with the same name and compatible data types

多选题Which three statements are true about Cisco IOS Firewall?()AIt can be configured to block Java traffic.BIt can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.CIt can only examine network layer and transport layer information.DIt can only examine transport layer and application layer information.EThe inspection rules can be used to set timeout values for specified protocols.FThe ip inspect cbac-name command must be configured in global configuration mode.

多选题Which two statements about the Cisco Aironet Desktop Utility (ADU) are true()AThe Aironet Desktop Utility (ADU )profile manager feature can create and manage only one profile for the wireless client adapter.BThe Aironet Desktop Utility (ADU) can support only one wireless client adapter installed and used at a time.CThe Aironet Desktop Utility (ADU) can be used to establish the association between the client adapter and the access point , manage authentication to the wireless network , and enable encryption.DThe Aironet Desktop Utility (ADU) and the Microsoft Wireless Configuration Manager can be used at the same time to configure the wireless client adapter.

多选题Which two statements are true regarding the USING and ON clauses in table joins?()ABoth USING and ON clauses can be used for equijoins and nonequijoinsBAmaximum of one pair of columns can be joined between two tables using the ON clauseCThe ON clause can be used to join tables on columns that have different names but compatible data typesDThe WHERE clause can be used to apply additional conditions in SELECT statements containing the ON or the USING clause

多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router

多选题Which two statements are true about the RMAN validate database command?()AIt checks the database for intrablock corruptions.BIt can detect corrupt pfiles.CIt can detect corrupt spfiles.DIt checks the database for interblock corruptions.EIt can detect corrupt block change tracking files.

多选题Which two statements are true about WHERE and HAVING clauses? ()AA WHERE clause can be used to restrict both rows and groups.BA WHERE clause can be used to restrict rows only.CA HAVING clause can be used to restrict both rows and groups.DA HAVING clause can be used to restrict groups only.EA WHERE clause CANNOT be used in a query of the query uses a HAVING clause.FA HAVING clause CANNOT be used in subqueries.

多选题Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.)AThe ADR base keeps all diagnostic information in binary formatBSQL*Plus provides the ADRI script, which can be used to work with ADRCThe ADR can be used for problem diagnosis only when the database is openDThe ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullEThe ADR can be used for problem diagnosis even when the database instance is downFThe ADR base is shared across multiple instances

多选题Which statements are true regarding the Query Result Cache?()AIt can be set at the system, session, or table level.BIt is used only across statements in the same session.CIt can store the results from normal as well as flashback queries.DIt can store the results of queries based on normal,temporary,and dictionary tables.

多选题Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()AIt is used in multihome network scenarios.BIt can be used with BGP to mitigate DoS and DDoS.CIt does not need to have CEF enabled.DIt is enabled via the interface level command ip verify unicast reverse-path.EIt cannot be used with classification access lists.

多选题Which two statements regarding symmetric key encryption are true?() (Choose two.)AThe same key is used for encryption and decryption.BIt is commonly used to create digital certificate signatures.CIt uses two keys: one for encryption and a different key for decryption.DAn attacker can decrypt data if the attacker captures the key used for encryption.

多选题Which two statements about the Cisco Nexus 1000V VSM are true?()AIt performs switching decisions and forwarding for the VEMBIt can be run on a virtual machineCIt can be used for remote VEM switching Iine cards

多选题Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()AIt can be invoked only from the doGet or doPost methods.BIt can be used independently of the getRemoteUser method.CCan return true even when its argument is NOT defined as a valid role name in the deployment descriptor.DUsing the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.