网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements are true regarding proxy ARP?()
A

Proxy ARP is enabled by default.

B

Proxy ARP is not enabled by default.

C

JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.

D

JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements are true regarding proxy ARP?()AProxy ARP is enabled by default.BProxy ARP is not enabled by default.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled” 相关考题
考题 Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.) A. It is necessary to forward ARP requests to remote hosts.B. It is necessary when translated traffic belongs to the same subnet as the ingress interface.C. It is not automatic and you must configure it.D. It is enabled by default and you do not need to configure it.

考题 In a Bridged 1483 network, an ISP has received complaints from their subscribers of denial of service attacks.The ISP suspects these attacks are coming from other subscribers that share the same IP unnumbered interface on the ERX.What can be done to solve this problem?()A. Enable Proxy ARP.B. Disable Proxy ARP.C. Enable Inverse ARP.D. Disable Inverse ARP.

考题 Which one of the protocols below allows a router to respond to an ARP request destined to a remote host?() A. Gateway DPB. Reverse ARPC. proxy ARPD. Inverse ARPE. indirect ARP

考题 ARPProxy说法不正确的是() A.ARP proxy即网关代替主机回复ARP请求,用自己的接口MAC地址来回复B.ARP代理也叫ARP出租,混合ARPC.ARP proxy可以使得处于不同物理网络但网络号相同的内部主机可以正常的相互通信D.ARP proxy即网关代替主机回复ARP请求,回复的MAC地址是目的主机的MAC地址

考题 ARP Proxy主要是通过代理的方式来解决网络互通的问题,ARP Proxy以分为下面几种?() A.路由式ARP ProxyB.VLAN 内ARP ProxyC.二层ARP ProxyD.VLAN 间ARP Proxy

考题 Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.()A、Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCIB、Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop protoco address or the DLCI for outgoing trafficC、Inverse ARP is enabled by default for all protocols enabled on the physical interfaceD、Inverse ARP is configured using the following command under the Interface configuration ’frame-relaymap dlci (dlci number) protocol protocol-address’E、Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet

考题 In a Bridged 1483 network, an ISP has received complaints from their subscribers of denial of service attacks. The ISP suspects these attacks are coming from other subscribers that share the same IP unnumbered interface on the ERX. What can be done to solve this problem?()A、Enable Proxy ARP.B、Disable Proxy ARP.C、Enable Inverse ARP.D、Disable Inverse ARP.

考题 Which one of the protocols below allows a router to respond to an ARP request destined to a remote host?()A、Gateway DPB、Reverse ARPC、proxy ARPD、Inverse ARPE、indirect ARP

考题 Which statement about Frame Relay is not true?()A、Static mapping is used when the remote router does not support Inverse ARP.B、Frame Relay Inverse ARP requires LMI capability to construct an address to the DLCI mapping tableon the router.C、Frame Relay Inverse ARP is disabled by default in Cisco IOS Software for all protocols that areenabled on the physical interface.D、Inverse ARP does not work when LMI is disabled.E、Frame Relay provides forward and backward congestion notification messages

考题 Which three statements best describe HSRP configuration on Cisco Nexus switches?()A、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.B、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.C、 You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.D、 You can use the show standby command to verify HSRP operation and configuration.E、 If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

考题 The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

考题 Which statement is true regarding proxy ARP?()A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.B、Proxy ARP is enabled by default on chassis clusters.C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

考题 Which of the following processes, is used to find the hardware address of a LAN device?()A、Inverse-ARPB、Reverse-ARPC、Proxy ARPD、ARP

考题 When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()A、RARP requestB、Show Network Address requestC、Proxy ARP requestD、ARP requestE、Show Hardware Address request

考题 Which three statements are true when working with high-availability clusters? (Choose three.)()A、The valid cluster-id range is between 0 and 255.B、Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.C、If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.D、A reboot is required if the cluster-id or node value is changed.E、Junos OS security devices can belong to one cluster only.

考题 Which three statements are true when working with high-availability clusters?()A、The valid cluster-id range is between 0 and 255.B、JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.C、If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.D、A reboot is required if the cluster-id or node value is changed.E、JUNOS security devices can belong to one cluster only.

考题 Which two statements are true regarding proxy ARP?()A、Proxy ARP is enabled by default.B、Proxy ARP is not enabled by default.C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

考题 单选题In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A private VLANsB port securityC BPDU guardD dynamic ARP inspectionE DHCP snooping

考题 单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A  MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B  Port scanners are the most effective defense against dynamic ARP inspection.C  MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D  Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E  DHCP snooping sends unauthorized replies to DHCP queries.F  ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G  None of the other alternatives apply.

考题 多选题ARP Proxy主要是通过代理的方式来解决网络互通的问题,ARP Proxy以分为下面几种?()A路由式ARP ProxyBVLAN 内ARP ProxyC二层ARP ProxyDVLAN 间ARP Proxy

考题 多选题Which three statements are true when working with high-availability clusters?()AThe valid cluster-id range is between 0 and 255.BJUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJUNOS security devices can belong to one cluster only.

考题 多选题Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)AIt is necessary to forward ARP requests to remote hosts.BIt is necessary when translated traffic belongs to the same subnet as the ingress interface.CIt is not automatic and you must configure it.DIt is enabled by default and you do not need to configure it.

考题 多选题如果用户属于不同的VLAN,可以使用VLAN间Proxy ARP技术,关于VLAN间Proxy ARP技术说法错误的是()A交换机的接口使能了VLAN间Proxy ARP功能之后,接口再接收到目的地址不是自己的ARP请求报文后,交换机会立即丢弃该报文B使能VLAN间Proxy ARP之后,交换机会将自己的MAC地址无条件发送给ARP请求方CVLAN间Proxy ARP主要用于处于不同VLAN的用户进行三层通信D也可在Super VLAN对应的VLANIF接口上启动VLAN间Proxy ARP功能,实现Sub VLAN间用户互通

考题 多选题Which three statements best describe HSRP configuration on Cisco Nexus switches?()AIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.BIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.CYou can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.DYou can use the show standby command to verify HSRP operation and configuration.EIf you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

考题 多选题Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.()ADynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCIBResponses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop protoco address or the DLCI for outgoing trafficCInverse ARP is enabled by default for all protocols enabled on the physical interfaceDInverse ARP is configured using the following command under the Interface configuration ’frame-relaymap dlci (dlci number) protocol protocol-address’EInverse ARP in Frame-Relay is synonymous of ARP in Ethernet

考题 多选题Which three statements are true when working with high-availability clusters? (Choose three.)()AThe valid cluster-id range is between 0 and 255.BJunos OS security devices can belong to more than one cluster if cluster virtualization is enabled.CIf the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.DA reboot is required if the cluster-id or node value is changed.EJunos OS security devices can belong to one cluster only.

考题 单选题Which statement is true regarding proxy ARP?()A Proxy ARP is enabled by default on stand-alone JUNOS security devices.B Proxy ARP is enabled by default on chassis clusters.C JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.D JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

考题 多选题Which two statements are true regarding proxy ARP?()AProxy ARP is enabled by default.BProxy ARP is not enabled by default.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled