网友您好, 请在下方输入框内输入要搜索的题目:
If you want to go, I would give you my advice that you take an umbrella.
A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C, which hosts shared services. However, traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()
- A、route redistribution
- B、import and export using route descriptors
- C、import and export using route targets
- D、Cisco MPLS Traffic Engineering
正确答案:C
What are two advantages that the Cisco SA 520 all-in-one UTM security device has over implementing a typical router in a small business network?()
- A、 Cisco Intrusion Prevention System
- B、 higher bandwidth
- C、 virtual private networks
- D、 access control lists
- E、 URL filtering
正确答案:C,E
A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C, which hosts shared services. However, traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()
- A、route redistribution
- B、import and export using route descriptors
- C、import and export using route targets
- D、Cisco MPLS Traffic Engineering
正确答案:C
You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010. You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010. You need to recommend a strategy for sharing information with the partner organization to meet the following requirements: .Provide cross-organizational access to user contacts .Provide cross-organizational access to free/busy information What should you recommend?()
- A、Creating cross-forest trusts
- B、Implementing Federated Sharing
- C、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007
- D、Running the Microsoft Exchange Inter-Organization Replication tool
正确答案:B
思科网络工程师题库201-327Q201.An organization is implementing URL blocking using Cisco UmbrellA. The users are able to go to some sites but other sites are not accessible due to an error. Why is the error occurring?A.Client computers do not have the Cisco Umbrella Root CA certificate installed.B.IP-Layer Enforcement is not configured.C.Client computers do not have an SSL certificate deployed from an internal CA server.D.Intelligent proxy and SSL decryption is disabled in the policy.Answer: AExplanation:Other features are dependent on SSL Decryption functionality, which requires the Cisco Umbrella root certificate. Having the SSL Decryption feature improves:Custom URL Blocking-Required to block the HTTPS version of a URL.Umbrellas Block Page and Block Page Bypass features present an SSL certificate to browsers that make connections to HTTPS sites. This SSL certificate matches the requested site but will be signed by the Cisco Umbrella certificate authority (CA). If the CA is not trusted by your browser, an error page may be displayed. Typical errors include The security certificate presented by this website was not issued by atrusted certificate authority (Internet Explorer), The sites security certificate is not trusted! (Google Chrome) or This Connection is Untrusted (Mozilla Firefox). Although the error page is expected, the message displayed can be confusing and you may wish to prevent it from appearing. To avoid these error pages, install the Cisco Umbrella root certificate into your browser or the browsers of your users-if youre a network admin.Reference:https:/docs.umbrell A.com/deployment-umbrella/docs/rebrand-cisco-certificate-import-informationQ202.Which two aspects of the cloud PaaS model are managed by the customer but not the provider? (Choose two)A.virtualizationB.middlewareC.operating systemsD.applicationsE.data Answer: DE Explanation:Customers must manage applications and data in PaaS.Q203.What is an attribute of the DevSecOps process?A.mandated security controls and check listsB.security scanning and theoretical vulnerabilitiesC.development securityD.isolated security team Answer: CExplanation:DevSecOps (development, security, and operations) is a concept used in recent years to describe how to move security activities to the start of the development life cycle and have built-in security practices in the continuous integration/continuous deployment (CI/CD) pipeline. Thus minimizing vulnerabilities and bringing security closer to IT and business objectives.Three key things make a real DevSecOps environment:+ Security testing is done by the development team.+ Issues found during that testing is managed by the development team.+ Fixing those issues stays within the development team.Q204.An engineer notices traffic interruption on the network. Upon further investigation, it is learned that broadcast packets have been flooding the network.What must be configured, based on a predefined threshold, to address this issue?A.Bridge Protocol Data Unit guardB.embedded event monitoringC.storm controlD.access control lists Answer: C Explanation:Storm control prevents traffic on a LAN from being disrupted by a broadcast, multicast, or unicast storm on one of the physical interfaces. A LAN storm occurs when packets flood the LAN, creating excessive traffic and degrading network performance. Errors in the protocol-stack implementation, mistakes in network configurations, or users issuing a denial-of-service attack can cause a storm. By using the storm-control broadcast level falling-threshold we can limit the broadcast traffic on the switch.Q205.Which two cryptographic algorithms are used with IPsec? (Choose two)A.AES-BACB.AES-ABCC.HMAC-SHA1/SHA2D.Triple AMC-CBCE.AES-CBC Answer: CE Explanation:Cryptographic algorithms defined for use with IPsec include:+ HMAC-SHA1/SHA2 for integrity protection and authenticity.+ TripleDES-CBC for confidentiality+ AES-CBC and AES-CTR for confidentiality.+ AES-GCM and ChaCha20-Poly1305 providing confidentiality and authentication together efficiently.Q206.In which type of attack does the attacker insert their machine between two hosts that are communicating with each other?A.LDAP injectionB.man-in-the-middleC.cross-site scriptingD.insecure API Answer: B Explanation:New Questions (added on 2nd-Jan-2021)Q207.Which Dos attack uses fragmented packets to crash a target machine?A.smurfB.MITMC.teardropD.LAND Answer: C Explanation:A teardrop attack is a denial-of-service (DoS) attack that involves sending fragmented packets to a target machine. Since the machine receiving such packets cannot reassemble them due to a bug in TCP/IP fragmentation re
You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010. You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010. You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts .Provide cross-organizational access to free/busy information What should you recommend?()
- A、Creating cross-forest trusts
- B、Implementing Federated Sharing
- C、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007
- D、Running the Microsoft Exchange Inter-Organization Replication tool
正确答案:B
You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010. You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010. You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts .Provide cross-organizational access to free/busy information What should you recommend?()
- A、Creating cross-forest trusts
- B、Implementing Federated Sharing
- C、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007
- D、Running the Microsoft Exchange Inter-Organization Replication tool
正确答案:B
A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C,which hosts shared services. However,traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()
- A、route redistribution
- B、import and export using route descriptors
- C、import and export using route targets
- D、Cisco MPLS Traffic Engineering
正确答案:C
You are the enterprise administrator for an Exchange Server 2010 organization. All users run Microsoft Office Outlook 2010. You are designing a sharing solution for your organization and a partner organization. The partner organization also uses Exchange Server 2010. You need to recommend a strategy for sharing information with the partner organization to meet thefollowing requirements: .Provide cross-organizational access to user contacts .Provide cross-organizational access to free/busy information What should you recommend?()
- A、Creating cross-forest trusts
- B、Implementing Federated Sharing
- C、Implementing Microsoft Identify Lifecycle Manager (ILM) 2007
- D、Running the Microsoft Exchange Inter-Organization Replication tool
正确答案:B
You have an Exchange Server 2010 organization. You plan to deploy a public folder access solution to meet the following requirements: .Users in the legal department must be able to send e-mail messages to public folders .Users in the legal department must not be able to read documents in the public folders by using OutlookWeb App (OWA) You need to recommend changes to public folder access that meet the company requirements. What should you recommend?()
- A、mail-enabled public folders and Editor permissions
- B、mail-enabled public folders and Contributor permissions
- C、OWA segmentation and Reviewer permissions
- D、OWA segmentation and Send As permissions
正确答案:B
更多 “思科网络工程师题库4” 相关考题
- 以下用于下行文的文种是()A、指示B、通知C、命令D、函E、批复
- 多选题某年6月1日,某县卫生监督所接到群众举报,声称某个体户销售变质腐烂的猪肉。根据此线索,在未对其销售变质猪肉的事实是否存在作出调查的情况下,依据《食品安全法》有关规定作出行政处罚决定,对其处以1000元罚款。提示:食品生产经营人员的卫生对食品的卫生影响重大,对生产、经营人员个人卫生要求不严,极易导致食品污染。《食品安全法》第八条规定,对食品生产经营人员的要求是()A销售直接入口的食品时,必须使用销售工具B经常保持个人卫生C头发用帽子全部遮盖,不落入食品中D生产和销售时必须将手洗净E工作中不需要的物品不应带入工作场所F穿戴清洁的工作衣、帽
- 患者,男性,20岁,双侧口角湿白、糜烂、皲裂、结痂,伴阴囊瘙痒、鳞屑,可能是缺乏()A、维生素AB、维生素B1C、维生素B2D、维生素CE、维生素D
- 患者,男性,44岁。已诊断为成人牙周炎并经基础治疗6周后,右上6牙周袋仍深达6mm,且探诊出血,牙龈退缩1mm,附着龈宽度为4mm,X线片检查可见根分叉处骨嵴顶骨密度明显降低,呈完全透射区,则最适宜于()。A、袋内壁刮治术B、牙龈成形术C、袋壁切除术D、截根术E、引导组织再生术
- 多选题有助于提高高原缺氧耐受能力的维生素是()A维生素ABB族维生素C维生素CD维生素DE维生素E
- 组织学表现为恶性者所占比例很高的疾病是()A、白斑B、红斑C、扁平苔藓D、慢性盘状红斑狼疮E、黏膜下纤维化
- 单选题每增加10岁,能量摄入量较青年时期减少10%开始的年龄是()。A 45岁B 55岁C 50岁D 60岁E 65岁
- 一个正透镜的焦距为1米,求这个透镜的屈光度是多少?
- 用3%过氧化氢做牙周袋内冲洗的作用是()A、具有光谱杀菌作用B、改变牙周袋内厌氧环境C、作用时间长杀菌效率高D、迅速吸附于细菌表面而发挥杀菌作用E、使细胞质沉淀而杀菌
- 传达会议事项一般用()文种。A、命令B、决定C、会议纪要D、通知
- 2022年最新冀教版八年级数学下册第二十一章一次函数单元测试试卷(含答案详解)
- 2022年最新冀教版八年级数学下册第二十一章一次函数定向攻克试卷(精选含答案)
- 2022年最新冀教版八年级数学下册第二十一章一次函数章节测试试卷(含答案解析)
- 教师继续教育“网络教学的设计与实施”在线测试题-
- 2022年最新冀教版八年级数学下册第二十一章一次函数专项练习试题(含答案解析)
- 内蒙古呼和浩特回民2022年高三第五次模拟考试化学试卷含解析
- 2020年普通高等学校招生全国I卷五省优创名校第四次联考理综试题Word版(176C)-
- 2020-2021学年黑龙江省牡丹江市高一上学期期末考试生物试题 Word版-
- 2019届湖北省华中师范大学第一附属中学高三5月押题考试理科综合--生物试题(含答案)-
- 常微分课后答案第五章-20220728.doc