当前位置:主页   - 电脑 - 认证考试 - Cisco
思科CCSP 642-542认证考题
来源:网络   作者:佚名   更新时间:2011-10-01
收藏此页】    【字号    】    【打印】    【关闭

  1.drag drop

思科CCSP 642-542认证考题

  Drag and drop question. Drag the items to the proper locations.

  Correct Answers:

思科CCSP 642-542认证考题

  2.drag drop

思科CCSP 642-542认证考题

  Drag and drop question. Drag the items to the proper locations.

  Correct Answers:

思科CCSP 642-542认证考题

  3.What is the primary method of mitigating port redirection attacks?

  A: keep firewalls up to date with the latest patches and fixes

  B: do not allow trust models

  C: keep OS and applications up to date with the latest patches and fixes

  D: use proper trust models

  Correct Answers: D

  4.How are password attacks mitigated in the SAFE SMR midsize network design corporate Internet module?

  A: filtering at the ISP, edge router, and corporate firewall

  B: RFC 2827 and 1918 filtering at ISP edge and midsize network edge router

  C: e-mail content filtering, HIDS, and host-based virus scanning

  D: OS and IDS detection

  E: CAR at the ISP edge and TCP setup controls at the firewall

  Correct Answers: D

  5.What method helps mitigate the threat of IP spoofing?

  A: access control

  B: logging

  C: SNMP polling

  D: Layer 2 switching

  Correct Answers: A

  6.Why are all providers of Internet connectivity urged to implement the filtering described in RFC 2827?

  A: to prohibit attackers from using source addresses that reside within a range of legitimately advertised prefixes

  B: to prohibit attackers from using forged source addresses that do not reside within a range of legitimately advertised prefixes

  C: to filter Java applications that come from a source that is not trusted

  D: to stop internal users from reaching web sites that violate the established security policy

  Correct Answers: B

  7.What are three steps of the Security Wheel? Choose three.

  A:improve

  B:log

  C:maintain

  D:test

  E:secure

  F:report

  Correct Answers: A, D, E

  8.How are port redirection attacks mitigated in the SAFE SMR small network campus module?

  A: switched infrastructure

  B: host based virus scanning

  C: the use of NIDS and application access control

  D: the latest security fixes and NIDS

  E: private VLANs

  F: HIDS

  Correct Answers: F

  9.Which commands are used for basic filtering in the SAFE SMR small network campus module? Choose two.

  A:access-group

  B:ip inspect-name

  C:ip route

  D:access-list

  Correct Answers: A, D

  10.Which is a key server found in SAFE Enterprise network design edge corporate internet module?

  A: database server

  B: application server

  C: URL filtering server

  D: proxy server

  Correct Answers: C

其它资源
来源声明

版权与免责声明
1、本站所发布的文章仅供技术交流参考,本站不主张将其做为决策的依据,浏览者可自愿选择采信与否,本站不对因采信这些信息所产生的任何问题负责。
2、本站部分文章来源于网络,其版权为原权利人所有。由于来源之故,有的文章未能获得作者姓名,署“未知”或“佚名”。对于这些文章,有知悉作者姓名的请告知本站,以便及时署名。如果作者要求删除,我们将予以删除。除此之外本站不再承担其它责任。
3、本站部分文章来源于本站原创,本站拥有所有权利。
4、如对本站发布的信息有异议,请联系我们,经本站确认后,将在三个工作日内做出修改或删除处理。
请参阅权责声明