网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()
A

Stateful firewall

B

Proxy firewall

C

Packet filtering firewall

D

Stateless firewall


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()A Stateful firewallB Proxy firewallC Packet filtering firewallD Stateless firewall” 相关考题
考题 Which of the following is the BEST way to allow web software through the server firewall?() A. Implement an application exception.B. Implement an access control list (ACL).C. Open the corporate firewall to allow port 80.D. Implement port blocking on port 80.

考题 Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 The Cisco NAC Appliance is able to check which three items before allowing network access?()A、client antivirus software stateB、personal firewall settingsC、wireless cell bandwidth availabilityD、IOS versions for routers and switchesE、appropriate client patch management levelF、appropriate QoS settings for client application Answer:

考题 Which information is stored in the stateful session flow table while using a stateful firewall?()A、the inside private IP address and the translated inside global IP addressB、the source and destination IP addresses, port numbers,TCP sequencing information, and additional flags for each TCP or UDP connection associated with a particular sessionC、the outbound and inbound access rules (ACL entries)D、all TCP and UDP header information only

考题 The Cisco NAC Appliance is able to check which three items before allowing network access?()A、 client antivirus software stateB、 personal firewall settingsC、 wireless cell bandwidth availabilityD、 IOS versions for routers and switchesE、 appropriate client patch management levelF、 appropriate QoS settings for client application

考题 Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.

考题 Which of the following describes how to set the Read-only attribute on a folder?()A、Right-click the folder  Properties  Security tab  select the username from the list  Permissions  clear the box labeled Read  OKB、Open the folder  Tool  Folder Options  General tab  Read-only  OKC、Open the Command Prompt  type attrib r [drive:][path]  EnterD、Open the Command Prompt  type attrib +r [drive:][path]  EnterE、Right-click the folder  Properties  General tab  Attributes  select Read-only  OK

考题 Which node type will use only NetBIOS broadcast requests using UDP broadcast?()A、 b-node (type 0x01)B、 p-node (type 0x02)C、 m-node (type 0x04)D、 h-node (type 0x08)

考题 Which of the following network protocols is needed to ensure that users can type in a FQDN instead of the IP address?()A、DNSB、FTPC、WINSD、IMAP4

考题 After testing a new 100BaseTX cable, the technician determines that only pairs 4, 5, 7, and 8 are straight-thru wires. Which of the following MOST likely describes this cable type?()A、Crossover cable with open pairsB、Crossover cableC、Rollover cableD、Straight-thru cable with open pairs

考题 Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A、21B、443C、3389D、8080

考题 A technician needs to check which ports are open in the Windows Firewall. Which of the following willallow the technician to view these settings?()A、netsh firewall show loggingB、ipconfig /allC、netsh firewall show stateD、arp -a

考题 Which of the following interfaces is appropriate for an Ethernet adapter that is configured with an IEEE 802.3 frame type?()A、at0B、en0C、et0D、tr0

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()A、Hot backupB、Online backupC、consistent backupD、incremental backupE、inconsistent backup

考题 Your company has a server that runs Windows Server 2008 R2. The server is configured as a remoteaccess server. The external firewall has TCP port 80 and TCP port 443 open for remoteconnections. You have a home computer that runs Windows 7. You need to establish secure remote accessconnection from the home computer to the remote access server.  Which type of connection should you configure? ()A、IPSECB、L2TPC、PPTPD、SSTP

考题 Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP.When the users try to connect to the VPN server, they receive the following error message :Error 721:The remote computer is not responding.You need to ensure that users can establish a VPN connection.What should you do?()A、Open port 1423 on the firewall.B、Open port 1723 on the firewall.C、Open port 3389 on the firewall.D、Open port 6000 on the firewall.

考题 单选题Which node type will use only NetBIOS broadcast requests using UDP broadcast?()A  b-node (type 0x01)B  p-node (type 0x02)C  m-node (type 0x04)D  h-node (type 0x08)

考题 单选题Which of the following interfaces is appropriate for an Ethernet adapter that is configured with an IEEE 802.3 frame type?()A at0B en0C et0D tr0

考题 多选题You administer a network with Windows-based endpoints that have custom software images. You want to use Host Checker to require that endpoints are running the custom software image.Which two Host Checker policy rules would be used to enforce this requirement?()AIsolate a file name unique to the custom image and create a custom rule-type of File which matches on the file. Select the Required option under the custom rule.BIdentify the MAC address unique to network cards installed in PCs with the custom image and create a custom rule-type of MAC Address which matches on the appropriate MAC address.CSelect the Required option under the custom rule Identify the IP address unique to the network cards installed in PCs with the custom image and create a custom rule-type of IP Address which matches on the appropriate IP address. Select the Required option under the custom rule.DIsolate or create a unique Windows registry key for the custom image and create a custom rule- type of Registry Setting which matches on the name of the registry key.

考题 多选题You plan to take a closed database backup using operating system commands. Which three SHUTDOWN options are appropriate for this type of backup?()AABORTBNORMALCIMMEDIATEDTRANSACTIONAL

考题 多选题Which two statements are true regarding firewall user authentication?()AWhen configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.CIf a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.DIf a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 多选题Which two statements are true regarding firewall user authentication?() (Choose two.)AWhen configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.BWhen configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.CIf a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .DIf a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 单选题You have a firewall enforcer protecting sensitive internal resources in a data center. The network traversed by endpoint traffic is semi-trusted, so you need to encrypt the traffic between the endpoints accessing the resources and the firewall enforcer.Which type of policies provide this level of protection?()A resource access policiesB Host Enforcer policiesC source IP enforcement policiesD IPsec enforcement policies

考题 单选题Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()A 21B 443C 3389D 8080

考题 单选题You work as a database administrator for Certkiller .com. Your database is in NOARCHIVELOG mode and you want to perform a backup. Which type of backup would be appropriate in this case? ()A Hot backupB Online backupC consistent backupD incremental backupE inconsistent backup

考题 单选题If you needed to transport traffic coming from multiple VLANs (connected between switches), and  your CTO was insistent on using an open standard,which protocol would you use?()A 802.11BB spanning-treeC 802.1QD ISLE VTPF Q.921