网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which feature is a potential security weakness of a traditional stateful firewall?()

  • A、It cannot support UDP flows.
  • B、It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.
  • C、It cannot detect application-layer attacks.
  • D、The status of TCP sessions is retained in the state table after the sessions terminate.

参考答案

更多 “Which feature is a potential security weakness of a traditional stateful firewall?()A、It cannot support UDP flows.B、It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.C、It cannot detect application-layer attacks.D、The status of TCP sessions is retained in the state table after the sessions terminate.” 相关考题
考题 Project Risk _____ .A should not be calculated for small projects.B is the probability of each risk event minus the sum of the consequences of potential risk events.C is the cumulative effect of uncertain occurrences which will adversely affect project objectives.D cannot be quantified for first time projects.E B or D

考题 170 Project Risk _____ .A. should not be calculated for small projects.B. is the probability of each risk event minus the sum of the consequences of potential risk events.C. is the cumulative effect of uncertain occurrences which will adversely affect project objectives.D. cannot be quantified for first time projects.E. B or D

考题 Which three statements are characteristic of the MEMORY storage engine?() A.It can support transactionsB.Table contents are not saved if the server is restartedC.It cannot contain text or BLOB columnsD.It can support foreign keysE.Each table is represented on disk as an.frm fileF.Each table has a corresponding.MYI and .MYD file

考题 Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?() A. Active Flow PipeliningB. Fast Connection SetupC. TCP Acceleration (AFP)D. Forward Error Correction

考题 Which iSQL*Plus feature can be used to replace values in the WHERE clause?() A.substitution variablesB.replacement variablesC.prompt variablesD.instead-of variablesE.This feature cannot be implemented through iSQL*Plus.

考题 In other words, each connection creates a (72) witha length that may be totally different from another path created by another connection. This means that TCP cannot use the same retransmission time for all connections. A.path B.window C.response D.process

考题 Which file characteristic cannot be used in the Cisco IronPort Data Security policies?() A、 file typeB、 file sizeC、 file ageD、 file name

考题 Which of these statements regarding Cisco’s WebVPN support is correct?()A、 Cisco ISR Routers with the Enhanced Security Bundles support WebVPN.B、 Cisco security appliances act as a proxy between the end user and the target web server.C、 Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN.D、 Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.

考题 Which type of firewall is needed to open appropriate UDP ports required for RTP streams?()A、Stateful firewallB、Proxy firewallC、Packet filtering firewallD、Stateless firewall

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

考题 Which information is stored in the stateful session flow table while using a stateful firewall?()A、the inside private IP address and the translated inside global IP addressB、the source and destination IP addresses, port numbers,TCP sequencing information, and additional flags for each TCP or UDP connection associated with a particular sessionC、the outbound and inbound access rules (ACL entries)D、all TCP and UDP header information only

考题 In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A、private VLANsB、port securityC、BPDU guardD、dynamic ARP inspectionE、DHCP snooping

考题 A user can send e-mail, but cannot receive any e-mail. Which of the following settings should be verified in the e-mail account?()A、MAC addressB、TCP/IP addressC、POP Server settingsD、SMTP Server settings

考题 A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()A、23B、443C、8080D、3389

考题 What are two circumstances for which it may be advisable to use the  silent uninstallation method instead of an interactive method?()A、 The Administrator is unable to successfully export DISPLAY to a  remote server.B、 IBM Tivoli Workload Scheduler is installed on a server for which  there is no console access.C、 DNS is not working properly and the server cannot be accessed  remotely to run the uninstallation script.D、 TCP on the server on which IBM Tivoli Workload Scheduler is  installed is configured for half-duplex rather than full-duplex.E、 The remote IBM Tivoli Workload Scheduler server is multi-homed, thus  the return connection to IBM Tivoli Workload Scheduler cannot be  established thereby requiring the use of the silent  uninstaller.

考题 Which Packet Flow Acceleration feature is most effective for short-lived TCP sessions?()A、Active Flow PipeliningB、Fast Connection SetupC、TCP Acceleration (AFP)D、Forward Error Correction

考题 Which /SQL*Plus feature can be used to replace values in the WHERE clause?()A、Substitution variablesB、Replacement variablesC、Prompt variablesD、Instead-of variablesE、This feature cannot be implemented through /SQL*Plus.

考题 Which /SQL*Plus feature can be used to replace values in the WHERE clause?()A、Substitution variablesB、Replacement variablesC、Prompt variablesD、Instead-of variablesE、This feature cannot be implemented through /SQL*Plus

考题 Connection Manager features cannot be used with which of the following naming method? ()A、Oracle namesB、Local NamingC、Host NamingD、Names Server

考题 Which three statements are characteristic of the MEMORY storage engine?()A、It can support transactionsB、Table contents are not saved if the server is restartedC、It cannot contain text or BLOB columnsD、It can support foreign keysE、Each table is represented on disk as an.frm fileF、Each table has a corresponding.MYI and .MYD file

考题 You configure a new SQL Server 2005 computer to use TCP/IP with all default settings. Your corporate policy requires that each server use a firewall. You find that you can connect to the SQL Server instance from the local computer. However, client computers cannot connect to the SQL Server instance. You need to identify the most likely cause of the connection issues. What should you do first?()A、Ensure that port 1433 is open in your firewall. B、Ensure that port 443 is open in your firewall. C、Ensure that client computers connect by using Shared Memory protocol. D、Ensure that the server is not paused.

考题 单选题Which information is stored in the stateful session flow table while using a stateful firewall?()A the inside private IP address and the translated inside global IP addressB the source and destination IP addresses, port numbers,TCP sequencing information, and additional flags for each TCP or UDP connection associated with a particular sessionC the outbound and inbound access rules (ACL entries)D all TCP and UDP header information only

考题 单选题In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A private VLANsB port securityC BPDU guardD dynamic ARP inspectionE DHCP snooping

考题 单选题You configure a new SQL Server 2005 computer to use TCP/IP with all default settings. Your corporate policy requires that each server use a firewall. You find that you can connect to the SQL Server instance from the local computer. However, client computers cannot connect to the SQL Server instance.You need to identify the most likely cause of the connection issues. What should you do first?()A Ensure that port 1433 is open in your firewall.B Ensure that port 443 is open in your firewall.C Ensure that client computers connect by using Shared Memory protocol.D Ensure that the server is not paused.

考题 单选题Which feature is a potential security weakness of a traditional stateful firewall?()A It cannot support UDP flows.B It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.C It cannot detect application-layer attacks.D The status of TCP sessions is retained in the state table after the sessions terminate.

考题 单选题A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()A 23B 443C 8080D 3389

考题 单选题Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()A  file typeB  file sizeC  file ageD  file name