A.denial of service
B.brute force
C.reconnaissance
D.Trojan horse
您可能感興趣的試卷
你可能感興趣的試題
A.This command should be executed from the global configuration mode.
B.The IP address 10.121.16.8 is the local router port used to forward data.
C.102 is the remote DLCI that will receive the information.
D.This command is required for all Frame Relay configurations.
E.The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC
A.mismatched TKIP encryption
B.null SSID
C.cordless phones
D.mismatched SSID
E.metal file cabinets
F.antenna type or direction
A.to control vty access into a router
B.to control broadcast traffic through a router
C.to filter traffic as it passes through a router
D.to filter traffic that originates from the router
E.to replace passwords as a line of defense against security incursions
A.point-to-point
B.broadcast multi-access
C.nonbroadcast multi-access
D.nonbroadcast multipoint
E.broadcast point-to-multipoint
最新試題
What is the default administrative distance of OSPF?()
A network administrator needs to configure a serial link between the main office and a remote location.The router at the remote office is a non-cisco router. How should the network administrator configure the serial interface of the main office router to make the connection?()
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()
Which statement describes the rule of split horizon?()
Which IPsec security protocol should be used when confidentiality is required?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()
Which encapsulation type is a Frame Relay encapsulation type that is supported by Cisco routers?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()
At which layer of the OSI model is RSTP used to prevent loops?()