單項選擇題

Refer to the exhibit. What statement is true about the interface S1/0 on router R1?()

A.Labeled packets can be sent over an interface.
B.MPLS Layer 2 negotiations have occurred.
C.IP label switching has been disabled on this interface.
D.None of the MPLS protocols have been configured on the interface.


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two statements describe the functions and operations of IDS and IPS systems?()

A.A network administrator entering a wrong password would generate a true-negative alarm.
B.A false positive alarm is generated when an IDS/IPS signature is correctly identified.
C.An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
D.Cisco IDS works inline and stops attacks before they enter the network.
E.Cisco IPS taps the network traffic and responds after an attack.
F.Profile-based intrusion detection is also known as "anomaly detection".

2.多項選擇題Which two statements about common network attacks are true?()

A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
B.Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
C.Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
D.Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
E.Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
F.Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

3.多項選擇題Which three statements are true about Cisco IOS Firewall?()

A.It can be configured to block Java traffic.
B.It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
C.It can only examine network layer and transport layer information.
D.It can only examine transport layer and application layer information.
E.The inspection rules can be used to set timeout values for specified protocols.
F.The ip inspect cbac-name command must be configured in global configuration mode.

4.多項選擇題Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()

A.allows dynamic routing over the tunnel
B.supports multi-protocol (non-IP) traffic over the tunnel
C.reduces IPsec headers overhead since tunnel mode is used
D.simplifies the ACL used in the crypto map
E.uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

5.多項選擇題What are three objectives that the no ip inspect command achieves?()

A.removes the entire CBAC configuration
B.removes all associated static ACLs
C.turns off the automatic audit feature in SDM
D.denies HTTP and Java applets to the inside interface but permits this traffic to the DMZ
E.resets all global timeouts and thresholds to the defaults
F.deletes all existing sessions

最新試題

If an edge Label Switch Router (LSR) is properly configured,which three combinations are possible?()

題型:多項選擇題

What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()

題型:多項選擇題

Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()

題型:單項選擇題

Which form of DSL technology is typically used as a replacement for T1 lines?()

題型:單項選擇題

Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()

題型:單項選擇題

Which three categories of signatures can a Cisco IPS microengine identify?()

題型:多項選擇題

Refer to the exhibit.What are the two options that are used to provide High Availability IPsec?()

題型:多項選擇題

Refer to the exhibit. What type of security solution will be provided for the inside network?()

題型:單項選擇題

Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.Which command needs to be applied to the SOHO77 to complete the configuration?()

題型:單項選擇題

What are two steps that must be taken when mitigating a worm attack?()

題型:多項選擇題