多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection
多选题
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().
A
requires access lists to identify the voice traffic
B
can allow traffic from a device without 802.1X authentication, by MAC address
C
can allow traffic from Cisco IP phones by listening to their CDP advertisements
D
allows all packets marked with a ToS of 5 to bypass authentication
E
allows all IP voice packets to bypass authentication via stateful inspection
参考解析
解析:
暂无解析
相关考题:
Which three advanced permit actions within security policies are valid?() (Choose three.) A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associate permitted traffic with a NAT rule.E. Mark permitted traffic for IDP processing.
You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()A. Resource access policy on the MAG Series deviceB. IPsec routing policy on the MAG Series deviceC. General traffic policy blocking access through the firewall enforcerD. Auth table entry on the firewall enforcer
Which of these is true of a Layer 3 out-of-band NAS deployment?() A. The NAS acts as a gateway for all Layer 3 traffic.B. Only the MAC address is used to identify the client device.C. User traffic remains on the same VLAN for the duration of the connection.D. After authentication and posture assessment, client traffic no longer passes through the NAS.
Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A、 LWAPP encrypts control traffic between the AP and the controller.B、 LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC、 LWAPP encrypts both control traffic and user data.D、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
Which of the following is the MOST important consideration when implementing a data retentio program?()A、 The data destruction requirementsB、 The user awareness training programC、 The laws and legal requirements of the dataD、 The companys individual data retention policies
You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A、 Store the credential of a user in the data source.B、 Configure the infrastructure to support Kerberos authentication.C、 Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D、 Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.
When a client using the SERVER_ENCRYPT authentication type connects to a server using the SERVER authentication type, what happens?()A、An error will occur.B、Data passed between the client and the server is encrypted.C、User IDs and passwords are passed to the server unencrypted.D、User IDs and passwords are encrypted before they are passed to the server.
What is the objective of the aaa authentication login console-in local command?()A、It specifies the login authentication method list named console-in using the local user database on the routerB、It specifies the login authorization method list named console-in using the local RADIUS username-password data baseC、It specifies the login authentication list named console-in using the local username- password data base on the routerD、It specifies the login authorization method list named console-in using the local username- password data base on the router
Which two traffic types trigger pass-through firewall user authentication?()A、SSHB、TelnetC、ICMPD、OSPFE、HTTP
Which of these is true of a Layer 3 out-of-band NAS deployment?()A、 The NAS acts as a gateway for all Layer 3 traffic.B、 Only the MAC address is used to identify the client device.C、 User traffic remains on the same VLAN for the duration of the connection.D、 After authentication and posture assessment, client traffic no longer passes through the NAS.
Which statement describes the Authentication Proxy feature?()A、All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.B、A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.C、Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.D、The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection
Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A、 LWAPP encrypts both control traffic and user data.B、 LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.D、 LWAPP encrypts control traffic between the AP and the controller.E、 None of the other alternatives apply.
Which three advanced permit actions within security policies are valid?()A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.
Which three features are provided by Oracle Net Services? ()A、Data encryption.B、User authentication.C、Transparent data conversionD、Configuration and administration mechanisms.E、Support for multiple network transport protocols.
多选题Which three advanced permit actions within security policies are valid?()AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.
单选题You design a Business Intelligence (BI) solution by using SQL Server 2008. The solution includes a SQL Server 2008 Reporting Services (SSRS) infrastructure in a scale-out deployment. All reports use a SQL Server 2008 relational database as the data source. You implement row-level security. You need to ensure that all reports display only the expected data based on the user who is viewing the report. What should you do?()A Store the credential of a user in the data source.B Configure the infrastructure to support Kerberos authentication.C Configure the infrastructure to support anonymous authentication by using a custom authentication extension.D Ensure that all report queries add a filter that uses the User.UserID value as a hidden parameter.
多选题Which three advanced permit actions within security policies are valid?() (Choose three.)AMark permitted traffic for firewall user authentication.BMark permitted traffic for SCREEN options.CAssociate permitted traffic with an IPsec tunnel.DAssociate permitted traffic with a NAT rule.EMark permitted traffic for IDP processing.
单选题Which statement accurately describes firewall user authentication?()AFirewall user authentication provides another layer of security in a network.BFirewall user authentication provides a means for accessing a JUNOS Software-based security device.CFirewall user authentication enables session-based forwarding.DFirewall user authentication is used as a last resort security method in a network.
单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separate.B The voice traffic will normally be on a different IP subnet than will the data traffic.C End user intervention is necessary to place the phone into the proper VLAN.D The same security policy should be implemented for both voice and data traffic.E The data VLAN must be configured as the native VLAN.
多选题Which two traffic types trigger pass-through firewall user authentication?()ASSHBTelnetCICMPDOSPFEHTTP
单选题Examine the RMAN command: SWITCH DATAFILE ’/DISK3/user_data01.dbf’; Which command do you need to issue before you issue the above command, so that RMAN finds the file in the restored location of ’DISK2/user_data01.dbf’? ()ARESTORE DATAFILE ’/DISK2/user_data01.dbf’BRESTORE DATAFILE ’/DISK3/user_data01.dbf’CSET NEWNAME FOR ’/DISK3/user_data01.dbf’ TO’/DISK2/user_data01.dbf’DSET NEWNAME FOR ’/DISK2/user_data01.dbf’ TO’/DISK3/user_data01.dbf’
单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A LWAPP encrypts control traffic between the AP and the controller.B LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC LWAPP encrypts both control traffic and user data.D When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
多选题You have a firewall enforcer protecting resources in a data center. A user is experiencing difficulty connecting to a protected resource.Which two elements must exist so the user can access the resource?()AResource access policy on the MAG Series deviceBIPsec routing policy on the MAG Series deviceCGeneral traffic policy blocking access through the firewall enforcerDAuth table entry on the firewall enforcer
单选题What is the objective of the aaa authentication login console-in local command?()AIt specifies the login authentication method list named console-in using the local user database on the routerBIt specifies the login authorization method list named console-in using the local RADIUS username-password data baseCIt specifies the login authentication list named console-in using the local username- password data base on the routerDIt specifies the login authorization method list named console-in using the local username- password data base on the router
单选题Which of the following is the MOST important consideration when implementing a data retentio program?()A The data destruction requirementsB The user awareness training programC The laws and legal requirements of the dataD The companys individual data retention policies
多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection
多选题USER_DATA is a nonencrypted tablespace that contains a set of tables with data. You want to convert all existing data in the USER_DATA tablespace and the new data into the encrypted format. Which methodswould you use to achieve this?()AUse Data Pump to transfer the existing data to a new encrypted tablespaceBUse ALTER TABLE MOVE to transfer the existing data to a new encrypted tablespaceCUse CREATE TABLE AS SELECT to transfer the existing data to a new encrypted tablespaceDEnable row movement for each table to be encrypted and then use ALTER TABLESPACE to encrypt the tablespaceEEncrypt the USER_DATA tablespace using the ALTER TABLESPACE statement so that all the data in the tablespace is automatically encrypted