网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()
A

It resembles a Layer 2 bridge.

B

Traffic flow through the IPS resembles traffic flow through a Layer 3 router.

C

Inline interfaces which have no IP addresses cannot be detected.

D

Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.” 相关考题
考题 Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?() A. Layer 1intercontroller roamingB. Layer 2intercontroller roamingC. Layer 3intercontroller roamingD. Layer 4intercontroller roaming

考题 You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device() A. It resembles a Layer 2 bridge.B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C. Inline interfaces which have no IP addresses cannot be detected.D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

考题 You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.() A. ensure a loop-free topologyB. protect against user-side loopsC. support business applicationsD. risk of lost connectivity without STP

考题 You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?() A. Flex LinksB. loop-free UC. looped squareD. looped triangle

考题 In which two locations in an enterprise network can an IPS sensor be placed?()A、bridging VLANs on two switchesB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunkingE、between a Layer 2 device and a Layer 3 device withtrunking

考题 Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

考题 A new lightweight access point (LAP) has been installed in the Company WLAN.  Which two  statements correctly describe the association process between this LAP and a WLAN controller? ()A、 An access point will search for a controller using a broadcast address if using LWAPP Layer 2  and a unicast address if using LWAPP Layer 3 mode.B、 If multiple wireless controllers are detected by an access point, the controller with the fewest  associated access points is chosen to associate with.C、 In order to associate in Layer 3 mode, the access point must have been preconfigured with an  IP address.D、 Once an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP  address from the controller.E、 An access point first searches for a controller in LWAPP Layer 2 mode. If the search is not  successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.F、 If multiple wireless controllers are detected by an access point, all of them will be used and  traffic will be load balanced.

考题 You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()A、ensure a loop-free topologyB、protect against user-side loopsC、support business applicationsD、risk of lost connectivity without STP

考题 You are the Cisco Network Designer in Cisco.com. Which layer NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()A、Layer 2B、Layer 3C、Layer 4D、out-of-band

考题 You are the Cisco Network Designer in Cisco.com. Which layer NAS operating mode are ACLfiltering and bandwidth throttling only provided during posture assessment?()A、 Layer 2B、 Layer 3C、 Layer 4D、 out-of-band

考题 Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A、Layer 1intercontroller roamingB、Layer 2intercontroller roamingC、Layer 3intercontroller roamingD、Layer 4intercontroller roaming

考题 Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 intracontroller roaming

考题 Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

考题 Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A、 Layer 1 intercontroller roamingB、 Layer 2 intercontroller roamingC、 Layer 3 intercontroller roamingD、 Layer 4 intercontroller roaming

考题 In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking

考题 You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()A、Flex LinksB、loop-free UC、looped squareD、looped triangle

考题 The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network.   Which two statements correctly describe features of this protocol? ()A、 Control traffic between an access point and a controller is encrypted within LWAPP.B、 Data traffic between an access point and a controller is encrypted within LWAPP.C、 Layer 3 mode packets are transmitted in TCP frames.D、 Data traffic between an access point and a controller is encapsulated within LWAPP.E、 VLAN tagging and QoS markings are applied at the access point.

考题 单选题Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()A  Layer 1 intercontroller roamingB  Layer 2 intercontroller roamingC  Layer 3 intercontroller roamingD  intracontroller roaming

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed? ()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

考题 多选题A new lightweight access point (LAP) has been installed in the Company WLAN.  Which two  statements correctly describe the association process between this LAP and a WLAN controller? ()AAn access point will search for a controller using a broadcast address if using LWAPP Layer 2  and a unicast address if using LWAPP Layer 3 mode.BIf multiple wireless controllers are detected by an access point, the controller with the fewest  associated access points is chosen to associate with.CIn order to associate in Layer 3 mode, the access point must have been preconfigured with an  IP address.DOnce an access point associates with a controller in LWAPP Layer 3 mode, it receives an IP  address from the controller.EAn access point first searches for a controller in LWAPP Layer 2 mode. If the search is not  successful, the access point then attempts to locate a controller in LWAPP Layer 3 mode.FIf multiple wireless controllers are detected by an access point, all of them will be used and  traffic will be load balanced.

考题 多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking

考题 多选题Which two of these are characteristics of an IPS device?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IPS interface and exits on another

考题 多选题Which of the following correctly describe steps in the OSI data encapsulation process?()ATransport layer divides a data stream into segments adds reliability flow control informationBData link layer adds physical source destination address an FCS to the segmentCPackets are created when the network layer encapsulate a frame with source destination host address protocol related control informationDPackets are created when the network layers adds layers 3 address control information to a segmentEThe presentation layer translated bits into bits into voltages for transmission across the physical link

考题 多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.

考题 多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

考题 单选题Which roaming option will keep them on the same IP subnet when client traffic is being bridged through LAN interfaces on two WLCs?()A  Layer 1 intercontroller roamingB  Layer 2 intercontroller roamingC  Layer 3 intercontroller roamingD  Layer 4 intercontroller roaming