单选题Which parameters must you select when configuring operating system probes SCREEN options?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag

题目
单选题
Which parameters must you select when configuring operating system probes SCREEN options?()
A

syn-fin, syn-flood, and tcp-no-frag

B

syn-fin, port-scan, and tcp-no-flag

C

syn-fin, fin-no-ack, and tcp-no-frag

D

syn-fin, syn-ack-ack-proxy, and tcp-no-frag

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two statements about the use of SCREEN options are correct? ()(Choose two.)

A. SCREEN options offer protection against various attacks

B. SCREEN options are deployed prior to route and policy processing in first path packet processing

C. SCREEN options are deployed at the ingress and egress sides of a packet flow

D. SCREEN options, you must take special care to protect OSPF


参考答案:A, B

第2题:

Click the Exhibit button.When configuring WXC A‘s local WAN parameters, which QoS network parameter would you choose?()

A. over-subscribed

B. under-subscribed

C. dedicated circuits

D. nondedicated circuits


参考答案:C

第3题:

You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()

A. access profile

B. IKE parameters

C. tunneled interface

D. redirect policy


参考答案:A, B

第4题:

When configuring the messaging system, which of the following are parameters of the e-mail transport? ()

  • A、Location
  • B、Protocol
  • C、Mode
  • D、Web Address
  • E、Host

正确答案:B,E

第5题:

When configuring private VLANs, which configuration task must you do first?()

  • A、Configure the private VLAN port parameters.
  • B、Configure and map the secondary VLAN to the primary VLAN.
  • C、Disable IGMP snooping.
  • D、Set the VTP mode to transparent.

正确答案:D

第6题:

Which parameters must you select when configuring operating system probes SCREEN options?()

A. syn-fin, syn-flood, and tcp-no-frag

B. syn-fin, port-scan, and tcp-no-flag

C. syn-fin, fin-no-ack, and tcp-no-frag

D. syn-fin, syn-ack-ack-proxy, and tcp-no-frag


参考答案:C

第7题:

You are a network technician at Certpaper.com. Which description is correct when you have generated RSA keys on your Cisco router to prepare for secure device management?()

  • A、You must then specify the general-purpose key size used for authentication with the crypto key generaters a general-keys modulus command.
  • B、You must then zeroize the keys to reset secure shell before configuring other parameters.
  • C、All vty ports are automatically enabled for SSH to provide secure management.
  • D、The SSH protocol is automatically enabled.

正确答案:D

第8题:

Which parameters are valid SCREEN options for combating operating system probes?()

A. syn-fin, syn-flood, and tcp-no-frag

B. syn-fin, port-scan, and tcp-no-flag

C. syn-fin, fin-no-ack, and tcp-no-frag

D. syn-fin, syn-ack-ack-proxy, and tcp-no-frag


参考答案:C

第9题:

Which of the following resources would best help you when configuring IBM System x and BladeCenter together in rack cabinets? ()

  • A、IBM System x and BladeCenter Competitive Sales Tool
  • B、Linux Cluster Sales Assistant - (LCSA)
  • C、Configuration & Options Guide - (COG)
  • D、Standalone Solutions Configuration Tool (SSCT)

正确答案:D

第10题:

Which two statements are true regarding trace options on Junos devices?()

  • A、You can see the contents of the log file by entering the show log <filename> command
  • B、Trace options will send information to your screen automatically
  • C、Trace options are limited to one protocol at a time
  • D、The file name and set of flags may be specified when enabling trace options

正确答案:A,D

更多相关问题