填空题18. The five core reasons for intruding on a system or network include ______. 导致网络入侵的5个主要原因是______。
填空题 Unicast RPF can operate in ______ or ______ mode
填空题20. A ______ threshold is triggered when the CPU utilization exceeds a configured threshold. 当CPU使用率高于某个预设值一段时间后,将触发______阈值。
填空题20. By distributing ______ across multiple key servers and controlling the order of the key servers in the configurations, some load balancing can be achieved. 通过在多台密钥服务器上注册数量均等的 ______ ,并在配置中控制密钥服务器的运行次序,从而在一定程度上实现负载均衡。
填空题20. The signature update license is configured on the router using the ______ command. 通过命令______为路由器配置签名更新许可。
填空题1. A typical NAT implementation includes a single ______ stub host that requires translation to a(n) ______ network. NAT通常用于将单一一个______末端主机地址转换为______网络地址。
填空题 When using EAP-MD5
填空题17. The ______ SNMP security model supports both authentication and encryption. ______ SNMP安全模型同时支持认证与加密。
填空题 GET VPNs provide connectionless
填空题19. If the key server fails to get a ______ to a rekey message from the group member after three rekeys, it removes the group member. 如果密钥服务器连续3次没有从组成员那里接收到关于密钥更新消息的______,那么密钥服务器将移除组成员关系。
填空题5. The Network Time Protocol (NTP)is typically used with the ______ SCF action. 网络时间协议(NTP)通常与SCF定义的______行为配合使用。
填空题2. ______ can increase the risk to remote clients and internal resources because the clients can potentially act as a relay between untrusted and trusted networks. ______会给远程客户端和内部资源带来风险,因为客户端可能成为不可信任网络和可信任网络之间的中继设备。
When a new trunk link is configured on an IOS based switch, which VLANs are allowed over the link?
Refer to the exhibit. The FMJ manufacturing company is concerned about unauthorized access to the Payroll Server. The Accounting1, CEO, Mgr1, and Mgr2 workstations should be the only computers with access to the Payroll Server. What two technologies should be implemented to help prevent unauthorized access to the server?
Refer to the exhibit. A network administrator configures a new router and enters the copy startup-config running-config on the router. The network administrator powers down the router and sets it up at a remote location. When the router starts, it enter the system configuration dialog as shown. What is the caust of the problem?
Which statement about access lists that are applied to an interface is true?
which command is used to enable CHAP authentication whit PAP as the fallback method on a serial interface?
Refer to the exhibit:The technician wants to upload a new IOS in the router while keeping the existing IOS. What is the maximum size of an IOS file that could be loaded if the original IOS is also kept in flash?
Which three statements about the features of SNMPv2 and SNMPv3 are true?
You are working in a data center environment and are assigned the address range 10.188.31.0/23.You are asked to develop an IP addressing plan to allow the maximum number of subnets with as many as 30 hosts each.Which IP address range meets these requirements?
