网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()
A
It resembles a Layer 2 bridge.
B
Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C
Inline interfaces which have no IP addresses cannot be detected.
D
Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
参考答案
参考解析
解析:
暂无解析
更多 “多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.” 相关考题
考题
Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()
A. Layer 1intercontroller roamingB. Layer 2intercontroller roamingC. Layer 3intercontroller roamingD. Layer 4intercontroller roaming
考题
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()
A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which have no IP addresses cannot be detected.D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
考题
Which two of these are characteristics of an IPS device?()
A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another
考题
You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()
A. ensure a loop-free topologyB. protect against user-side loopsC. support business applicationsD. risk of lost connectivity without STP
考题
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()
A. Flex LinksB. loop-free UC. looped squareD. looped triangle
考题
In which two locations in an enterprise network can an IPS sensor be placed?()A、bridging VLANs on two switchesB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunkingE、between a Layer 2 device and a Layer 3 device withtrunking
考题
Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another
考题
A new lightweight access point (LAP) has been installed in the Company WLAN. Which two statements correctly describe the association process between this LAP and a WLAN controller? ()A、 An access point will search for a controller using a broadcast address if using LWAPP Layer 2 and a unicast address if using LWAPP Layer 3 mode.B、 If multiple wireless controllers are detected by an access point, the controller with the fewest associated access points is chosen to associate with.C、 In order to associate in Layer 3 mode, the access point must have been preconfigured with an IP address.D、 Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP address from the controller.E、 An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.F、 If multiple wireless controllers are detected by an access point, all of them will be used and traffic will be load balanced.
考题
You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()A、ensure a loop-free topologyB、protect against user-side loopsC、support business applicationsD、risk of lost connectivity without STP
考题
You are the Cisco Network Designer in Cisco.com. Which layer NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()A、Layer 2B、Layer 3C、Layer 4D、out-of-band
考题
You are the Cisco Network Designer in Cisco.com. Which layer NAS operating mode are ACLfiltering and bandwidth throttling only provided during posture assessment?()A、 Layer 2B、 Layer 3C、 Layer 4D、 out-of-band
考题
Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A、Layer 1intercontroller roamingB、Layer 2intercontroller roamingC、Layer 3intercontroller roamingD、Layer 4intercontroller roaming
考题
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 intracontroller roaming
考题
Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".
考题
Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 Layer 4 intercontroller roaming
考题
In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking
考题
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()A、Flex LinksB、loop-free UC、looped squareD、looped triangle
考题
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.
考题
单选题Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A
Layer 1 intercontroller roamingB
Layer 2 intercontroller roamingC
Layer 3 intercontroller roamingD
intracontroller roaming
考题
多选题In which two locations in an enterprise network can an IPS sensor be placed? ()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking
考题
多选题A new lightweight access point (LAP) has been installed in the Company WLAN. Which two statements correctly describe the association process between this LAP and a WLAN controller? ()AAn access point will search for a controller using a broadcast address if using LWAPP Layer 2 and a unicast address if using LWAPP Layer 3 mode.BIf multiple wireless controllers are detected by an access point, the controller with the fewest associated access points is chosen to associate with.CIn order to associate in Layer 3 mode, the access point must have been preconfigured with an IP address.DOnce an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP address from the controller.EAn access point first searches for a controller in LWAPP Layer 2 mode. If the search is not successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.FIf multiple wireless controllers are detected by an access point, all of them will be used and traffic will be load balanced.
考题
多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking
考题
多选题Which two of these are characteristics of an IPS device?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IPS interface and exits on another
考题
多选题Which of the following correctly describe steps in the OSI data encapsulation process?()ATransport layer divides a data stream into segments adds reliability flow control informationBData link layer adds physical source destination address an FCS to the segmentCPackets are created when the network layer encapsulate a frame with source destination host address protocol related control informationDPackets are created when the network layers adds layers 3 address control information to a segmentEThe presentation layer translated bits into bits into voltages for transmission across the physical link
考题
多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.
考题
多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking
考题
单选题Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A
Layer 1 intercontroller roamingB
Layer 2 intercontroller roamingC
Layer 3 intercontroller roamingD
Layer 4 intercontroller roaming
热门标签
最新试卷