What are two security appliances that can be installed in a network? (Choose two.)
| A. | ATM |
| B. | IDS |
| C. | IOS |
| D. | IOX |
| E. | IPS |
| F. | SDM |
Section: Chapter 7: Security
Explanation/Reference:
Explanation:
IDS is an abbreviation of "Intrusion Detection Systems", which means to detect the operation status of network and system according to some security policy, and find every kind of
intrusion attempts, intrusion actions or intrusion results, to enhance the confidentiality, integrality and usability.
IPS(Intrusion Prevention System) is between firewall and network devices. When attacks detected, IPS would stop this malicious communication before the diffusion of this attack to other areas.
QUESTION 135
| A. | show ip interface [interface] access-lists |
| B. | show ip access-lists interface [interface] |
| C. | show ip interface [interface] |
| D. | show ip access-lists [interface] |
QUESTION 151
Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL?
| A. | Traffic will be dropped per line 30 of the ACL. |
| B. | Traffic will be accepted per line 40 of the ACL. |
| C. | Traffic will be dropped, because of the implicit deny all at the end of the ACL. |
| D. | Traffic will be accepted, because the source address is not covered by the ACL. |
Section: Chapter 7: Security
QUESTION 152
Refer to the exhibit. Which statement describes the effect that the Router1 configuration has on devices in the 172.16.16.0 subnet when they try to connect to SVR-A using Telnet or SSH?
| A. | Devices will not be able to use Telnet or SSH. |
| B. | Devices will be able to use SSH, but not Telnet. |
| C. | Devices will be able to use Telnet, but not SSH. |
| D. | Devices will be able to use Telnet and SSH. |
Section: Chapter 7: Security
Explanation/Reference:
This question is to examine the use of ACL.
According to the information provided in the exhibit:
172.16.16.0 can reach SVR-A by using SSH.
SVR-A can reach 172.16.16.0 by using telnet.
QUESTION 13
Which type of attack is characterized by flood of packet that requesing a TCP connection to a server?
| A. | denial of service |
| B. | brute force |
| C. | reconnaissance |
| D. | Trojan horse |
Section: Chapter 7: Security
Explanation/Reference:下载本文