网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()

  • A、close-connection
  • B、terminate-connection
  • C、close-client-and-server
  • D、terminate-session

参考答案

更多 “Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A、close-connectionB、terminate-connectionC、close-client-and-serverD、terminate-session” 相关考题
考题 To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:SQL ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;What is the significance of this setting?()A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.D. It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.

考题 Which IDP policy action closes the connection and sends an RST packet to both the client and the server?() A. close-connectionB. terminate-connectionC. close-client-and-serverD. terminate-session

考题 Which action statement in a policy list causes a packet to be placed in an outgoing port queue without performing an IP route lookup?() A.filterB.forwardC.next-hopD.next-interface

考题 Which action does the ping 172.18.1.1 size 5 command perform?() A. It sends only five ping requests to the 172.18.1.1 destination.B. It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C. It sends five rapid ping requests to the 172.18.1.1 destination.D. It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

考题 A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?() A. Packet snifferB. MultimeterC. Load balancerD. Throughput tester

考题 The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.browser-server B.user- server C.client-server D.business -customer

考题 The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.A.command-line B.graphical C.automation D.productivity

考题 Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?()A、denial of serviceB、brute forceC、reconnaissanceD、Trojan horse

考题 Which action does the ping 172.18.1.1 size 5 command perform?()A、It sends only five ping requests to the 172.18.1.1 destination.B、It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C、It sends five rapid ping requests to the 172.18.1.1 destination.D、It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

考题 A user opens a webpage that requires the transmission of packets from the Web server to the client's browser. The packets transmitted from the Web server to the client exceed the smallest MTU value on the communications path. Which two protocol functions allow this type of communication?()A、packet segmentationB、serialized checkingC、packet sequencingD、parallel checking

考题 A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. What action will the router take?()A、forwards the packetB、fragments the packetC、drops the packet silentlyD、drops the packet and sends an ICMP message

考题 What is the new Oracle Shared Server?()A、An improved version of multithreaded server configuration. B、A connection pooling configuration where several clients are connected to the same server process. C、Two more database servers, which share data by means of database links; the client software is unaware to which server it is connected. D、A configuration of Real Application Cluster where the client connection is routed to the least busy instance. 

考题 Which statement regarding the implementation of an IDP policy template is true?()A、IDP policy templates are automatically installed as the active IDP policy.B、IDP policy templates are enabled using a commit script.C、IDP policy templates can be downloaded without an IDP license.D、IDP policy templates are included in the factory-default configuration.

考题 Which of the following are not steps in setting up aTLS session? ()A、 Client sends Hello to Server listing all of its supported cipher suitesB、 Server sends Hello to Client listing all of its supported cipher suitesC、 Client calculates and sends encryptedpre_master_secretD、 Client and Server calculate keys from pre_master_secretE、 Server sends Change Cipher Spec to indicate a shift to encrypted mode

考题 A web server is running correctly but sending a RST packet to any client trying to connect using HTTP on TCP port 80. Which of the following tools should be used to determine the listening port of the web server?()A、RouteB、IfconfigC、NetstatD、Nslookup

考题 A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()A、Packet snifferB、MultimeterC、Load balancerD、Throughput tester

考题 You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()A、activating a JUNOS Software commit scriptB、configuring an IDP groups statementC、setting up a chassis clusterD、downloading the IDP policy templatesE、installing the policy templates

考题 Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A、close-connectionB、terminate-connectionC、close-client-and-serverD、terminate-session

考题 If the PFE does not have a route to the destination address of a packet, which action will be taken?()A、The PFE floods the packet out of all interfaces.B、The PFE drops the packet and sends a destination unreachable notification back to source device.C、The PFE forwards the packet to the routing engine for furtherprocessing.D、The PFE queues the packet and sends are quest for a layer3 lookup to the routing engine.

考题 A client/server application has been configured to use local naming. The client and server run on separate machines. When the client tries to connect, it receives a TNS error. By carefully examining the environment, a tnsnames.ora is found only on the Oracle server machine, among other things. After copying this tnsnames.ora onto the client machine, the client is able to connect to the server.  Which statement is true?()A、tnsnames.ora must be on the client machine for local naming. B、tnsnames.ora must be removed from the server for the connection to work. C、tnsnames.ora must be on both the client and server machines for local naming. D、tnsnames.ora is not required for local naming; the problem was not fixed by copying the file to the client.

考题 Your network contains an Active Directory domain. All client computers run Windows XP Service Pack 3 (SP3). The domain contains a member server named Server1 that runs Windows Server 2008 R2. On Server1, you create a connection security rule that requires authentication for inbound and outbound connections. You configure the connection security rule to use Kerberos authentication. You need to ensure that the client computers can connect to Server1. The solution must ensure that all connections to Server1 are encrypted. What should you do?()A、From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.B、From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.C、From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.D、From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.

考题 单选题You need to design a software usage policy for the employees of Southbridge Video. The policy must meet business requirements. What should you do?()A Configure the software restriction policy in the Default Domain Policy Group Policy object (GPO)B Create a new connection object by using the Connection Manager Administration Kit (CMAK), and install the new connection object on all client computersC Create and configure a local security policy on both of the ISA server computersD Configure the Internet Explorer settings in the Default Domain Policy Group Policy object (GPO)

考题 单选题To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows: SQL ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10; What is the significance of this setting?()A It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.B It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.C It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.D It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.

考题 单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A close-connectionB terminate-connectionC close-client-and-serverD terminate-session

考题 多选题You are implementing an IDP policy template from Juniper Networks. Which three steps are included in thisprocess?()Aactivating a JUNOS Software commit scriptBconfiguring an IDP groups statementCsetting up a chassis clusterDdownloading the IDP policy templatesEinstalling the policy templates

考题 单选题If the PFE does not have a route to the destination address of a packet, which action will be taken?()A The PFE floods the packet out of all interfaces.B The PFE drops the packet and sends a destination unreachable notification back to source device.C The PFE forwards the packet to the routing engine for furtherprocessing.D The PFE queues the packet and sends are quest for a layer3 lookup to the routing engine.

考题 单选题Which action does the ping 172.18.1.1 size 5 command perform?()A It sends only five ping requests to the 172.18.1.1 destination.B It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.C It sends five rapid ping requests to the 172.18.1.1 destination.D It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

考题 单选题Which of the following are not steps in setting up aTLS session? ()A  Client sends Hello to Server listing all of its supported cipher suitesB  Server sends Hello to Client listing all of its supported cipher suitesC  Client calculates and sends encryptedpre_master_secretD  Client and Server calculate keys from pre_master_secretE  Server sends Change Cipher Spec to indicate a shift to encrypted mode