不定项选择题7. Which features of Cisco IOS Software enable you to mitigate STP manipulation?以下哪条命令用于降低STP欺骗攻击造成的危害?
不定项选择题16. which of the following are valid configurable 802.1X port states?以下哪些是合法的802.1X端口状态?
不定项选择题23. What are the two areas to investigate when troubleshooting VPNs?当对VPN进行故障排除时,需要重点留意的两个区域是?
不定项选择题18. Which of the following protocols are supposed by MPP? MPP支持以下哪些协议?
不定项选择题21. Which of the following is something that can cause issues in a PKI system?在PKI体系中,以下哪项可能会引起故障的发生?
不定项选择题9. Which of the following are valid design blueprints defined in SAFE?以下哪些属于SAFE架构定义的设计蓝图?
不定项选择题15. Why should static point-to-point virtual tunnel interfaces use IP unnumbered addresses?静态点对点虚拟隧道接口应采用无编号IP寻址的原因是什么?
不定项选择题20. What types of security controls are capable of monitoring traffic to detect problems in the network?哪种安全控制机制通过监控流量的行为以发现网络中可能存在的威胁?
不定项选择题10. From where are the Cisco SSC supplicant and the Cisco SSC Management Utility obtained?如何获取Cisco SSC请求方与Cisco SSC管理工具?
不定项选择题21. Which of the following ACL ranges are used for standard access lists?标准ACL可以使用的列表编号范围是多少? A. 100-199 b. 2000-2699 C. 1-99 D. 1300-1999
不定项选择题23. Which of the following are the two choices of rekeying used by key servers?密钥服务器可以选择以下哪两种方法来进行密钥更新?
不定项选择题 Which encapsulation mode
不定项选择题13. The IKE policy on both peers must match on all parameters except for which of the following?为两个对等体配置IKE策略时,除以下哪个参数外,其余所有参数必须匹配?
不定项选择题13. What should be alleviated first as a factor for troubleshooting?对于SSL VPN的故障排除而言,首当其冲地应当关注的因素是?
不定项选择题 Which network security element, if attacked
不定项选择题 By default
不定项选择题4. Which network topology is in use when every network has a direct VPN connection to every other network? This topology provides any—to—any communication and provides the most optimal direct path for network traffic. 拓扑结构判断:每个网络通过VPN与其他网络直接相连,这种拓扑能实现所有网络之间的通信,并提供最佳的数据传输路径。
不定项选择题2. Which of the following attack types describes when an attacker tries to take over the root bridge functionality on a network?攻击者试图取代网络中的合法根桥属于哪种攻击?
不定项选择题 If a license on a router expires
不定项选择题9. What security mechanism works by creating a hash that is then transmitted to verify authenticity?哪种安全机制使用散列函数验证通信双方的身份?
