Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
第1题:
Refer to the exhibit. A junior network administrator was given the task of configuring port security on SwitchA to allow only PC_A to access the switched network through port fa0/1. If any other device is detected, the port is to drop frames from this device. The administrator configured the interface and tested it with successful pings from PC_A to RouterA, and then observes the output from these two show commands.Which two of these changes are necessary for SwitchA to meet the requirements? ()
A.Port security needs to be globally enabled.
B.Port security needs to be enabled on the interface.
C.Port security needs to be configured to shut down the interface in the event of a violation.
D.Port security needs to be configured to allow only one learned MAC address.
E.Port security interface counters need to be cleared before using the show command.
F.The port security configuration needs to be saved to NVRAM before it can become active.
第2题:
Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()
第3题:
A. [edit security idp]
B. [edit security zones security-zone trust interfaces ge-0/0/0.0]
C. [edit security zones security-zone trust]
D. [edit security screen]
第4题:
What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()
第5题:
Which two statements are true about voice VLANs?()
第6题:
A.Pass
B.Flow
C.Allow
D.Inspect
第7题:
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
第8题:
A. They are always present in the NAT table.
B. They allow connection to be initiated from the outside.
C. They can be configured with access lists, to allow two or more connections to be initiated from the outside.
D. They require no inside or outside interface markings because addresses are statically defined.
第9题:
Which two options can be used as traffic descriptors when classifying and marking traffic? ()
第10题:
Which three practices are important to the implementation of a DiffServ QoS architecture?()