多选题Which three mechanisms are used to secure management traffic from outside IPS sensors?()Asecure tunnelsBa separate management VLANCsecure VLANs to isolate sensorsDan out-of-band path around the firewallEasymmetric traffic flows to isolate sensorsFprivate VLANs to put all sensors on isolated ports

多选题
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
A

secure tunnels

B

a separate management VLAN

C

secure VLANs to isolate sensors

D

an out-of-band path around the firewall

E

asymmetric traffic flows to isolate sensors

F

private VLANs to put all sensors on isolated ports


参考解析

解析: 暂无解析

相关考题:

An ATM PVC is configured as atm pvc 1 0 101 aal5snap 256 128 100 .Which three statements describe the traffic management characteristics of this interface?() A.AB.BC.CD.DE.E

Which three statements are true about the Internet Group Management Protocol (IGMP)? () A. There are three IGMP modes: dense mode, sparse mode, and sparse - dense modeB. IGMP is used to register individual hosts with a multicast groupC. IGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic fromD. IGMP messages a re IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1E. IGMP is a multicast routing protocol that makes packet - forwarding decisions independent of other routing protocols such as EIGRPF. IGMP snooping ru ns on Layer 3 routers

For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()A、secure network platformB、secure connectivityC、threat control and containmentD、policy management

Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()A、The use of a queuing method that will give VoIP traffic strict priority over other traffic  B、The use of RTP header compression for the VoIP traffic.C、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED for the VoIP traffic

Which three critical elements does the Cisco Integrated Security Solution incorporate?()A、Cisco Storage SolutionB、Cisco Threat Defense SolutionC、Cisco Trust and Identity Management SolutionD、Cisco Switching SolutionE、Cisco Content Networking SolutionF、Cisco Secure Connectivity

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.B、You must then zeroize the keys to reset secure shell before configuring other parameters.C、All vty ports are automatically enabled for SSH to provide secure management.D、The SSH protocol is automatically enabled.

Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()A、protocol typeB、CoSC、DSCPD、IP precedenceE、destination addressF、input interface

What are two QoS mechanisms that are used to prevent packet loss?()A、header compressionB、payload compressionC、low latency queuing (LLQ)D、weighted random early detection (WRED)E、traffic policingF、traffic shaping

Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()A、the SDM QoS wizard will create two real-time traffic classes to handle VoIP, voice signaling, and video packetsB、the SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, video, and video packetsC、the SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packetsD、the SDM QoS wizard will create two business-critical traffic classes to handle transactional and  network management packetsE、the SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packetsF、the SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets

Which three mechanisms are used to secure management traffic from outside IPS sensors?()A、secure tunnelsB、a separate management VLANC、secure VLANs to isolate sensorsD、an out-of-band path around the firewallE、asymmetric traffic flows to isolate sensorsF、private VLANs to put all sensors on isolated ports

Which three of these items are IPv6 transition mechanisms? ()(Choose three.)A、ISATAPB、NATV6C、manually configured overlay tunnelsD、dual stack configurations

For the following items, which management topology keeps management traffic isolated from ActualTests.comproduction traffic?()A、OTPB、OOBC、SAFED、MARS

what is Cisco provides three mechanisms for regulating or shaping traffic?

What are three traffic descriptors typically used to categorize traffic into different classes?()A、IP precedenceB、media typeC、DSCPD、outgoing interfaceE、incoming interfaceF、DLCI

You work as a exchange administrator at TestKing.com. The TestKing.com network contains an internalnetwork as well as a perimeter network. The primeter network contains an Exchange Server 2010 EdgeTransport Server named TESTKING-EX. During the course of day you receive an instruction form the CIO to formulate a remote managementsolution for TESTKING-EX01 based on the set criteria below: You need to ensure that management traffic is encypted. You nedd to ensure that remote administration is permitted fron the Internet network.You need to ensure that Exchange Management Console (EMC) is supported. What should you do?()A、You should recommend that Windows Management Instrumentation Command-line (WMIC) be used.B、You should recommend that Lightweight Directory Access Protocol(LDAP)over Secure Socket Layer(SSL) be used.C、You should recommend that Windows Remote Management (WinRM) over SSL be used.D、You should recommend that Remote Desktop Protocol(RDP)over Secure Socket Layer(SSL)be used.

Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()A、KerberosB、Domain Name ServerC、Secure Sockets LayerD、Resource Monitoring and Control

多选题Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()Aprotocol typeBCoSCDSCPDIP precedenceEdestination addressFinput interface

单选题Which routing method is used to determine the forwarding paths for IP traffic in a Secure Cisco Single-Site Network foundation solution with remote teleworkers?()ARIPBEIGRPCOSPFDStatic and default routes

多选题What are three traffic descriptors typically used to categorize traffic into different classes?()AIP precedenceBmedia typeCDSCPDoutgoing interfaceEincoming interfaceFDLCI

问答题what is Cisco provides three mechanisms for regulating or shaping traffic?

多选题Which three mechanisms are used to secure management traffic from outside IPS sensors?()Asecure tunnelsBa separate management VLANCsecure VLANs to isolate sensorsDan out-of-band path around the firewallEasymmetric traffic flows to isolate sensorsFprivate VLANs to put all sensors on isolated ports

多选题Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true? ()AThe SDM QoS wizard will create two real-time traffic classes to handle VoIP and voice signaling packets.BThe SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, and video packets.CThe SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packets.DThe SDM QoS wizard will create two business-critical traffic classes to handle transactional and network management packets.EThe SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packets.FThe SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets.

多选题Which three critical elements does the Cisco Integrated Security Incorporate?()ACisco Trust and Identity Management SolutionBCisco Secure Connectivity SolutionCCisco Threat Defense SolutionDCisco Switching SolutionECisco Storage SolutionFCisco Content Networking Solution

单选题You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()AYou must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.BYou must then zeroize the keys to reset secure shell before configuring other parameters.CAll vty ports are automatically enabled for SSH to provide secure management.DThe SSH protocol is automatically enabled.

多选题Which three of the following network features are methods used to achieve high availability?()ASpanning Tree Protocol (STP)BDelay reductionCHot Standby Routing Protocol (HSRP)DDynamic routing protocolsEQuality of Service (QoS)FJitter management

多选题Which three techniques should be used to secure management protocols?()AConfigure SNMP with only read-only community strings.BEncrypt TFTP and syslog traffic in an IPSec tunnel.CImplement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.DSynchronize the NTP master clock with an Internet atomic clock.EUse SNMP version 2.FUse TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.

多选题Which three statements are true about the Internet Group Management Protocol (IGMP)? ()AThere are three IGMP modes: dense mode, sparse mode, and sparse - dense modeBIGMP is used to register individual hosts with a multicast groupCIGMP version 3 enables a multicast receiving host to specify to the router which sources it should forward traffic fromDIGMP messages a re IP datagrams with a protocol value of 2, destination address of 224.0.0.2, and a TTL value of 1EIGMP is a multicast routing protocol that makes packet - forwarding decisions independent of other routing protocols such as EIGRPFIGMP snooping ru ns on Layer 3 routers

多选题Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP traffic.CThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED for the VoIP traffic