填空题16. Group passwords are very vulnerable to compromise simply because of their ______ nature. 由于组密码具有______的特点,因此它非常容易遭到窃取和泄露。
填空题22. ______ fields are used by NetFlow to identify specific flows. NetFlow采用______字段标识特定的网络流。
填空题19. Cisco recommends that the ______ feature not be used in production environments. Cisco不建议在生产环境中启用______特性。
填空题14. Cisco IOS Software IPsec ______ is not supported on VTIs. IPSec VTI不支持Cisco IOS软件的______特性。
填空题3. ______ has a many-to-one relationship with traffic conversations being differentiated by port number. ______为多对一映射,每个会话被分配给一个指定端口。
填空题 The ______ includes the client MAC address
填空题5. A ______ server dynamically assigns IP addresses to hosts on a network. ______服务器的作用是为网络中的主机动态分配IP地址。
填空题17. Routing protocols can detect both ______ and ______. 动态路由协议能够同时检测______和______。
填空题6. The design blueprints have been designed around various PINs in a network; PINstands for ______. 设计蓝图中定义了各种PIN,PIN是______的缩写。
填空题14. ______ are individuals who have extensive knowledge of telephone networks and switching equipment. ______是精通电话网与交换设备的一类人群。
填空题 With Layer 3/4 traffic
填空题17. ______ is where existing point-to-point key exchanges can be tied together to soften the public key distribution problem. ______能够配合现存的安全点到点密钥交换方法来缓和公钥分发的问题。
填空题18. When assigning reflexive access lists to an interface,they are typically placed ______ on an interface facing away from the internal network or ______ on an interface facing toward the internal network. 为接口配置白反ACL时,通常将其置于背对内部网络的______方向,或面向内部网络的______方向。
填空题10. Traffic policy is applied ______ between zones using zone pairs. 通过使用区域对,流量策略在区域之间是______应用的。
填空题 9
填空题 When a signature is matched
填空题24. ______ scans scan the service ports of a single host and request different services ateach port. ______扫描是对一台主机的所有端口以及每个端口的不同服务进行扫描。
填空题20. The Cisco Configuration Professional (Cisco CP) is a GUI device-management application for ______. Cisco配置专家(Cisco CP)是一种用于配置______的GUI设备管理软件。
填空题5. ______ provides a framework that provides pokey negotiations and key management processes.是一种用于策略协商与密钥管理的框架。
填空题22. ______ is the process of determining that a user is who he says he is. ______ 是验证用户身份的过程。
