多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

多选题
Which three statements accurately describe IOS Firewall configurations?()
A

The IP inspection rule can be applied in the inbound direction on the secured interface

B

The IP inspection rule can be applied in the outbound direction on the unsecured interface

C

The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.

D

For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL


参考解析

解析: 暂无解析

相关考题:

An ATM PVC is configured as atm pvc 1 0 101 aal5snap 256 128 100 .Which three statements describe the traffic management characteristics of this interface?() A.AB.BC.CD.DE.E

Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.) A. includes three design levelsB. incorporates products and technologies into enterprise, service provider, and commercial systemsC. extends the value of designs through a sustained development planD. does not factor customer input design processE. facilitates faster and more reliable customer deploymentsF. incorporates a narrow range of technologies and products

According to findings of the bMightyResearch report, which two statements about UC Solutions accurately describe the attributes of SMB decision makers?()A、Only 20% of decision makers understand UC solutions.B、They are generally well-educated on what UC solutions offer.C、Many are yet to be convinced of the need for UC.D、They have a tendency to support current telephony vendors.

Which two statements best describe Cisco IOS IP SLA?()A、only implemented between Cisco source and destination-capable devicesB、statistics provided by syslog, CLI, and SNMPC、measures delay, jitter, packet loss, and voice qualityD、only monitors VoIP traffic flowsE、provides active monitoringF、provides passive monitoring

CS-MARS works with which IOS feature to accomplish anomaly detection?()A、 IOS IPSB、 AutosecureC、 CSAD、 NetflowE、 IOS Network Foundation Protection (NFP)F、 IOS Firewall

Which three statements about firewall modes are correct? ()A、 A firewall in routed mode has one IP addressB、 A firewall in transparent mode has one IP addressC、 In routed mode, the firewall is considered to be a Layer 2 dewD、 In routed mode, the firewall is considered to be a Layer 3 deviceE、 In transparent mode, the firewall is considered to be a Layer 2 deviceF、 In transparent mode, the firewall is considered to be a Layer 3 device

Which two statements accurately describe an IBGP peering session?() (Choose two.)A、Peers are statically defined.B、Peers exist within the same AS.C、Peers must be directly connected to each other.D、Peers advertise routes learned from other IBGP neighbors.

Which three statements about IOS Firewall configurations are true?()A、The IP inspection rule can be applied in the inbound direction on the secured interface.B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)A、includes three design levelsB、incorporates products and technologies into enterprise, service provider, and commercial systemsC、extends the value of designs through a sustained development planD、does not factor customer input design processE、facilitates faster and more reliable customer deploymentsF、incorporates a narrow range of technologies and products

Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

The Cisco NAC Appliance is able to check which three items before allowing network access?()A、client antivirus software stateB、personal firewall settingsC、wireless cell bandwidth availabilityD、IOS versions for routers and switchesE、appropriate client patch management levelF、appropriate QoS settings for client application Answer:

The Cisco NAC Appliance is able to check which three items before allowing network access?()A、 client antivirus software stateB、 personal firewall settingsC、 wireless cell bandwidth availabilityD、 IOS versions for routers and switchesE、 appropriate client patch management levelF、 appropriate QoS settings for client application

Which three statements describe how the strict SQL mode provides added security?()A、It rejects statements that try to insert out-of-range valuesB、It rejects invalid datesC、It limits the operations that the server can performD、It rejects queries that produce out-of-range valuesE、It rejects dates with zero day or month values

多选题On which three traffic types does firewall pass-through authentication work? ()(Choose three.)ApingBFTPCTelnetDHTTPEHTTPS

多选题Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()AA custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.BAn optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.CCustom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.DOnly the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.EThe outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.FThe SDM provides a basic, intermediate, and advanced firewall wizard.

多选题Which three statements about firewall modes are correct? ()AA firewall in routed mode has one IP addressBA firewall in transparent mode has one IP addressCIn routed mode, the firewall is considered to be a Layer 2 dewDIn routed mode, the firewall is considered to be a Layer 3 deviceEIn transparent mode, the firewall is considered to be a Layer 2 deviceFIn transparent mode, the firewall is considered to be a Layer 3 device

多选题Which three statements about IOS Firewall configurations are true?()AThe IP inspection rule can be applied in the inbound direction on the secured interface.BThe IP inspection rule can be applied in the outbound direction on the unsecured interface.CThe ACL applied in the outbound direction on the unsecured interface should be an extended ACL.DThe ACL applied in the inbound direction on the unsecured interface should be an extended ACL.EFor temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.FFor temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

单选题CS-MARS works with which IOS feature to accomplish anomaly detection?()A IOS IPSB AutosecureC CSAD NetflowE IOS Network Foundation Protection (NFP)F IOS Firewall

多选题What are three features of the Cisco IOS Firewall feature set?()Anetwork-based application recognition (NBAR)Bauthentication proxyCstateful packet filteringDAAA servicesEproxy serverFIPS

多选题Which two statements accurately describe a broadcast domain?()ABroadcast domains require that the participating devices connect to common switches or hubsBBroadcast domains consist of devices reachable by frames addressed to the Layer 2 broadcast addressCBroadcast domains require a gateway device such as a routerDBroadcast domains consist of devices that reside on the same VLAN

多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produce out-of-range valuesEIt rejects dates with zero day or month values

多选题According to findings of the bMightyResearch report, which two statements about UC Solutions accurately describe the attributes of SMB decision makers?()AOnly 20% of decision makers understand UC solutions.BThey are generally well-educated on what UC solutions offer.CMany are yet to be convinced of the need for UC.DThey have a tendency to support current telephony vendors.

多选题Which two statements accurately describe a broadcast domain?()ABroadcast domains require that the participating devices connect to common switches or hubs.BBroadcast domains consist of devices reachable by frames addressed to the Layer 2 broadcast address.CBroadcast domains require a gateway device such as a router.DBroadcast domains consist of devices that reside on the same VLAN.

多选题Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)Aincludes three design levelsBincorporates products and technologies into enterprise, service provider, and commercial systemsCextends the value of designs through a sustained development planDdoes not factor customer input design processEfacilitates faster and more reliable customer deploymentsFincorporates a narrow range of technologies and products

多选题Which two statements best describe Cisco IOS IP SLA?()Aonly implemented between Cisco source and destination-capable devicesBstatistics provided by syslog, CLI, and SNMPCmeasures delay, jitter, packet loss, and voice qualityDonly monitors VoIP traffic flowsEprovides active monitoringFprovides passive monitoring

多选题Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()ARouter A is responsible for answering ARP requests sent to the virtual IP address.BIf Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router ACIf another router were added to this GLBP group, there would be two backup AVGsDRouter B is in GLBP listen state.ERouter A alternately responds to ARP requests with different virtual MAC addresses.FRouter B will transition from blocking state to forwarding state when it becomes the AVG