Which of the following are not steps in setting up aTLS session? ()
第1题:
A. It routes all traffic that is addresses to the destination network to the interface indicates in the routing table.
B. It sends a copy of its neighbor table to all adjacent routers.
C. It sends a multicast query packet to all adjacent neighbors requesting available routing paths to the destination network.
D. It broadcasts Hello packets to all routers in the network to re-establish neighbor adjacencies.
第2题:
Using FTP passive mode, after the client opens thecommand channel (port 21) to the FTP server and requests passive mode, what will be the next step? ()
第3题:
A. close-connection
B. terminate-connection
C. close-client-and-server
D. terminate-session
第4题:
Your network consists of a single Active Directory domain. The domain contains a server named Server1 that runs Windows Server 2008.All client computers run Windows Vista. All computers are members of the Active Directory domain. You assign the Secure Server (Require Security) IPsec policy to Server1 by using a Group Policy object(GPO). Users report that they fail to connect to Server1.You need to ensure that users can connect to Server1. All connections to Server1 must be encrypted. What should you do? ()
第5题:
How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()
第6题:
Which of the following types of attacks does DHCP snooping prevent?(Choose all that apply.)()
第7题:
Which set of statements describes the correct order and process of a Company wireless user client associating with a wireless access point in the Company network? ()
第8题:
A.MD5 authentication is supported.
B.A client always synchronizes to a server even when the difference between the server clock and the local clock differs by a large amount.
C.JUNOS software can provide a primary time reference.
D.The boot-server configuration allows a router to synchronize its clock when it boots up, regardless of the offset between the NTP clock source and its internal clock.
E.It is useful to correlate timestamps on log files and other events for troubleshooting and forensics.
第9题:
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()
第10题:
Your network consists of single active domain. The domain contains a serve named server1 that runs windows server 2008 all client computers run windows vista. All computers are members of the active directory domain. You assign the secure server (Require Security) IPsec policy to server1 by using a GPO. Users report that they fail to connect to server1. You need to ensure that users can connect to server1. All connections to server1 must be encrypted. What should you do?()