网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

For which network anomaly does Junos provide a SCREEN?()

  • A、a telnet to port 80
  • B、a TCP packet with the SYN and ACK flags set
  • C、an SNMP getnext request
  • D、an ICMP packet larger than 1024 bytes

参考答案

更多 “For which network anomaly does Junos provide a SCREEN?()A、a telnet to port 80B、a TCP packet with the SYN and ACK flags setC、an SNMP getnext requestD、an ICMP packet larger than 1024 bytes” 相关考题
考题 Which OSI layer does a Router operate at?A.the Physical LayerB.the Data Link LayerC.the Transfer LayerD.the Network Layer

考题 For which network anomaly does Junos provide a SCREEN?() A. a telnet to port 80B. a TCP packet with the SYN and ACK flags setC. an SNMP getnext requestD. an ICMP packet larger than 1024 bytes

考题 Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?() A.SwitchB.HubC.ModemD.Repeater

考题 Refer to the exhibit. Which three statements correctly describe Network Device A?() A.With a network wide mask of 255.255.255.128, each interface does not require an IP address.B.With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.C.With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.D.With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.E.With a network wide mask of 255.255.254.0, each interface does not require an IP address.

考题 Network integration helps to build a powerful business foundation. Which approach does Ciscouse to integrate applications and services across the network infrastructure?()A、 application-levelB、 systems-levelC、 policy-levelD、 advanced services

考题 Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()A、 uses Netflow data for anomaly detectionsB、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackC、 accept events inputs from different network devicesvia syslog, SDEE and SNMPD、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityE、 pushes ACLs to network devices to only block the malicious trafficF、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location

考题 CS-MARS works with which IOS feature to accomplish anomaly detection?()A、 IOS IPSB、 AutosecureC、 CSAD、 NetflowE、 IOS Network Foundation Protection (NFP)F、 IOS Firewall

考题 A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A、 networkB、 applicationC、 sessionD、 data link

考题 When a host transmits data across a network to another host, which process does the data go through?()A、standardizationB、conversionC、encapsulationD、synchronization

考题 Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

考题 Which two WAN interfaces does the Cisco SRP 520 Series support? ()A、 passive optical network (PON)B、 serialC、 Fibre ChannelD、 Fast EthernetE、 ADSL2+

考题 Which network protocol does DNS use?()A、FTPB、TFTPC、TCPD、UDPE、SCP

考题 Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater

考题 A technician notices that when trying to ping a workstation by network name the workstation does not reply back over the network. The workstation is part of the domain and is able to get to the Internet. Which of the following is the cause of the problem?()A、Faulty cable on the workstationB、Wrong host name on the workstationC、Wrong WINS on the workstationD、Incorrect IP address assigned to the workstation

考题 Which system resources does WLM have the capability to control?()A、 CPU, Memory and Network I/O B、 CPU, Memory and Disk I/O C、 CPU and Memory D、 CPU and Disk I/O

考题 A customer asked a consultant to create the infrastructure for an application.  The application is designed to charge customers for conferencing services based on usage.  To determine if a Storage Area Network (SAN) is the best storage solution, which of the following questions is most appropriate?()A、Will the application require a database?B、Which operating system does the application require?C、Will the data need to be backed up in real time?D、Does the application share data among the servers?

考题 The ERX Edge Router in your Bridged 1483 network has multiple external DHCP servers configured.During discovery, which algorithm does the router use to decide which DHCP server to send packets to?()A、direct modeB、round robinC、weighted round robinD、No algorithm is used.

考题 Which three types of optimization does the WX 60 device perform when Exchange 2000 and Outlook 2000 are used in the network? ()(Choose three.)A、Fast Connection SetupB、TCP Acceleration (AFP)C、Network Sequence CachingD、AppFlow's MAPI accelerationE、Molecular Sequence Reduction

考题 多选题Refer to the exhibit. Which three statements correctly describe Network Device A?()AWith a network wide mask of 255.255.255.128, each interface does not require an IP address.BWith a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.CWith a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.DWith a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.EWith a network wide mask of 255.255.254.0, each interface does not require an IP address.

考题 单选题Network integration helps to build a powerful business foundation. Which approach does Ciscouse to integrate applications and services across the network infrastructure?()A  application-levelB  systems-levelC  policy-levelD  advanced services

考题 单选题A computer is connected to the network through a NIC, which has a unique assignment that is called the Ethernet MAC address. Which layer of the OSI model does the MAC address use to communicate with the network?()A  networkB  applicationC  sessionD  data link

考题 多选题Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()Auses Netflow data for anomaly detectionsBbuilds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackCaccept events inputs from different network devicesvia syslog, SDEE and SNMPDdynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityEpushes ACLs to network devices to only block the malicious trafficFusing topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location

考题 单选题CS-MARS works with which IOS feature to accomplish anomaly detection?()A  IOS IPSB  AutosecureC  CSAD  NetflowE  IOS Network Foundation Protection (NFP)F  IOS Firewall

考题 单选题For which network anomaly does Junos provide a SCREEN?()A a telnet to port 80B a TCP packet with the SYN and ACK flags setC an SNMP getnext requestD an ICMP packet larger than 1024 bytes

考题 单选题Which of the following is the advantage of Server to Server replication in a cluster environment over Disk to Disk?()A Reduced network trafficB Frequent BIOS updates are not requiredC Backup agent does not need to be installedD Provides greater overall fault tolerance

考题 单选题Which network protocol does DNS use?()A FTPB TFTPC TCPD UDPE SCP

考题 多选题Which two WAN interfaces does the Cisco SRP 520 Series support? ()Apassive optical network (PON)BserialCFibre ChannelDFast EthernetEADSL2+