單項選擇題

Refer to the exhibit. 

Which statement about the authentication process is true?()

A.The LIST1 list will disable authentication on the console port.
B.Because no method list is specified, the LIST1 list will not authenticate anyone on the console port.
C.All login requests will be authenticated using the group tacacs+ method.
D.All login requests will be authenticated using the local database method.
E.The default login authentication will automatically be applied to all login connections.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題

Refer to the exhibit. What type of security solution will be provided for the inside network?()

A.The TCP connection that matches the defined ACL will be reset by the router if the connection does not complete the three-way handshake within the defined time period.
B.The router will reply to the TCP connection requests. If the three-way handshake completes successfully, the router will establish a TCP connection between itself and the server.
C.The TCP traffic that matches the ACL will be allowed to pass through the router and create a TCP connection with the server.
D.The router will intercept the traceroute messages. It will validate the connection requests before forwarding the packets to the inside network.

2.多項選擇題

Refer to the exhibit.

What are the two options that are used to provide High Availability IPsec?()

A.RRI
B.IPsec Backup Peerings 
C.Dynamic Crypto Ma
D.HSRP
E.IPsec Stateful Switchover (SSO)
F.Dual Router Mode (DRM) IPsec


3.多項選擇題Which three MPLS statements are true?()

A.Cisco Express Forwarding (CEF) must be enabled as a prerequisite to running MPLS on a Cisco router.
B.Frame-mode MPLS inserts a 32-bit label between the Layer 3 and Layer 4 headers.
C.MPLS is designed for use with frame-based Layer 2 encapsulation protocols such as Frame Relay, but is not supported by ATM because of ATM fixed-length cells.
D.OSPF, EIGRP, IS-IS, RIP, and BGP can be used in the control plane.
E.The control plane is responsible for forwarding packets.
F.The two major components of MPLS include the control plane and the data plane.

4.單項選擇題

Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.

Which command needs to be applied to the SOHO77 to complete the configuration?()

A.encapsulation aal5snap applied to the PVC
B.encapsulation aal5ciscoppp applied to the PVC
C.encapsulation aal5ciscoppp applied to the ATM0 interface
D.encapsulation aal5mux ppp dialer applied to the ATM0 interface
E.encapsulation aal5mux ppp dialer applied to the PVC

5.多項選擇題What are two steps that must be taken when mitigating a worm attack?()

A.Inoculate systems by applying update patches. 
B.Limit traffic rate. 
C.Apply authentication. 
D.Quarantine infected machines. 
E.Enable anti-spoof measures.

6.單項選擇題When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()

A.Transparent tunneling must be enabled.
B.A valid root certificate must be installed.
C.A group pre-shared secret must be properly configured.
D.The option to "Allow Local LAN Access" must be selected.

7.單項選擇題During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()

A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process

8.多項選擇題Which three categories of signatures can a Cisco IPS microengine identify?()

A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures

9.單項選擇題Which statement about an IPS is true?()

A.The IPS is in the traffic path.
B.Only one active interface is required.
C.Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
D.When malicious traffic is detected,the IPS will only send an alert to a management station.

10.多項選擇題Which two statements about an IDS are true?()

A.The IDS is in the traffic path.
B.The IDS can send TCP resets to the source device.
C.The IDS can send TCP resets to the destination device.
D.The IDS listens promiscuously to all traffic on the network.
E.Default operation is for the IDS to discard malicious traffic.