多項(xiàng)選擇題Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A. ASM
B. BiDir PIM
C. PIM-SM RP
D. RP-Switchover
E. Source Specific Multicast


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is the default value of the SPT threshold in Cisco routers?()

A. 0
B. 1
C. 2
D. 4
E. 16
F. infinity

2.多項(xiàng)選擇題

Refer to the exhibit. Which two statements are correct regarding the creation of a multicas tdistribution tree? ()

A. Each router determines where to send the JOIN request.
B. The tree will be built based on the IP address of the E2 interface on router E
C. The best path to the source will be discovered in the unicast routing table on router B
D. The best path to the source will be discovered in the unicast routing table on router C
E. The best path to the source will be discovered in the unicast routing table on router E

3.單項(xiàng)選擇題To which of these does IP multicast send packets?()

A. a single host
B. a subset of hosts
C. all hosts sequentially
D. all hosts simultaneously

4.單項(xiàng)選擇題Which of these ports does syslog use to send messages to a syslog server?()

A. TCP 502
B. TCP 514
C. TCP 520
D. UDP 502
E. UDP 514
F. UDP 520

5.單項(xiàng)選擇題Which of these is a benefit of ESM?()

A. supports multiple MIBs
B. includes NetFlow, NBAR, and IP SLA software subsystems
C. includes NetFlow, syslog, and IP SLA software subsystems
D. includes a predefined framework for filtering and correlating messages
E. supports two logging processes so output can be sent in standard and ESM format

8.單項(xiàng)選擇題Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()

A. use BGP as the CE-PE routing protocol
B. use OSPF as the CE-PE routing protocol
C. use EIGRP as the CE-PE routing protocol
D. use the SP to redistribute routes as external routes for OSPF and EIGRP
E. use route redistribution at each location to ensure external routes are imported into the IGP

9.單項(xiàng)選擇題Which of these is true of a Layer 3 out-of-band NAS deployment?()

A. The NAS acts as a gateway for all Layer 3 traffic.
B. Only the MAC address is used to identify the client device.
C. User traffic remains on the same VLAN for the duration of the connection.
D. After authentication and posture assessment, client traffic no longer passes through the NAS.

10.多項(xiàng)選擇題Which three of these are important when determining NAS Server scaling? ()

A. interface bandwidth
B. rescan timer interval
C. total number of network devices
D. number of new user authentications per second
E. which operating system is loaded on the client
F. number of checks performed in a posture assessment

最新試題

Which two statements about Network Attached Storage are correct?()

題型:多項(xiàng)選擇題

Which statement correctly describes a situation in which VRFs are used in the data center?()

題型:單項(xiàng)選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項(xiàng)選擇題

What are two characteristics of GSS? ()

題型:多項(xiàng)選擇題

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

題型:單項(xiàng)選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項(xiàng)選擇題

Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

題型:多項(xiàng)選擇題

Which two of these correctly describe asymmetric routing and firewalls? ()

題型:多項(xiàng)選擇題

In which two locations in an enterprise network can an IPS sensor be placed? ()

題型:多項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項(xiàng)選擇題