1.Drag Drop question
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
2.Drag Drop question
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
3.Which IDS guideline should be followed, according to SAFE SMR?
A: use UDP resets more often than shunning, because UDP traffic is more difficult to spoof
B: use TCP resets more often than shunning, because TCP traffic is more difficult to spoof
C: use TCP resets no longer than 15 minutes
D: use UDP resets no longer than 15 minutes
Correct Answers: B
4.LAB
Correct Answers:
5.As an alternative design in the SAFE SMR small network campus module, a small filtering router can be placed between the rest of the network and which devices?
A: Layer 2 switches
B: management stations
C: corporate users
D: routers
Correct Answers: B
6.How are password attacks mitigated in the SAFE SMR midsize network design corporate Internet module?
A: filtering at the ISP, edge router, and corporate firewall
B: RFC 2827 and 1918 filtering at ISP edge and midsize network edge router
C: e-mail content filtering, HIDS, and host-based virus scanning
D: OS and IDS detection
E: CAR at the ISP edge and TCP setup controls at the firewall
Correct Answers: D
7.Following termination of the VPN tunnel, what action is performed on remote user traffic in the SAFE SMR midsize network design corporate Internet module?
A: Traffic is sent through a Layer 2 switch.
B: Traffic is sent through a Layer 3 switch.
C: Traffic is sent through a firewall.
D: Traffic is sent through a router.
Correct Answers: C
8.What are the SAFE guidelines when routing information is exchanged with an outside routing domain? (Select two.)
A:Use exterior gateway protocols only.
B:Use exterior gateway protocols that operate between routing domains and do not allow administrators to build and act on policies.
C:Use exterior gateway protocols because they allow administrators to build and act on policies rather than just on reachability information.
D:Do not use autonomous system path filters on every EBGP peering session in network.
E:Use exterior gateway protocols or static routes
F:Make certain that your outside peer advertises your routes to other peers for maximum reachability
Correct Answers: A, C
9.Which two Cisco components encompass secure management? Choose two.
A:Cisco VPN Concentrators
B:CiscoWorks
C:Cisco IDS Sensors
D:Cisco PIX Firewalls
E:Web Device Managers
Correct Answers: B, E
10.When is personal firewall software recommended in the software access option in the SAFE SMR remote user design environment?
A: when the VPN tunnel is established
B: when the VPN tunnel is not established
C: when the ISP does not provide firewall protection
D: when firewall protection is provided via the corporate connection
Correct Answers: B
版权与免责声明
1、本站所发布的文章仅供技术交流参考,本站不主张将其做为决策的依据,浏览者可自愿选择采信与否,本站不对因采信这些信息所产生的任何问题负责。
2、本站部分文章来源于网络,其版权为原权利人所有。由于来源之故,有的文章未能获得作者姓名,署“未知”或“佚名”。对于这些文章,有知悉作者姓名的请告知本站,以便及时署名。如果作者要求删除,我们将予以删除。除此之外本站不再承担其它责任。
3、本站部分文章来源于本站原创,本站拥有所有权利。
4、如对本站发布的信息有异议,请联系我们,经本站确认后,将在三个工作日内做出修改或删除处理。
请参阅权责声明!