多选题What are three benefits of using chassis clustering?()AProvides stateful session failover for sessions.BIncreases security capabilities for IPsec sessions.CProvides active-passive control and data plane redundancy.DEnables automated fast-reroute capabi

题目
多选题
What are three benefits of using chassis clustering?()
A

Provides stateful session failover for sessions.

B

Increases security capabilities for IPsec sessions.

C

Provides active-passive control and data plane redundancy.

D

Enables automated fast-reroute capabilities.

E

Synchronizes configuration files and session state

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two options best describe the purpose of session ID and cookie field in a L2TPv3 packet?()

  • A、The session ID is a 32-bit locally significant field used to identify the call on the destination or egresstunnel endport. The session ID will be negotiated by the control connection or statically defined if usingthe L2TP v3 data plane only
  • B、The cookie is a variable length(with a maximum of eight bytes),word-aligned optional field. The controlconnection can negotiate this as an additional level of guarantee beyond the regular session ID lookupto make sure that a data message has been directed to the correct session or that any recently reusedsession ID will not be misdirected
  • C、The cookie is a 32-bit locally significant field used to identify the call on the destination or egress tunnelendpoint. The cookie will be negotiated by the control connection or statically defined if using theL2TPv3 data plane only
  • D、The session ID is a variable length(with a maximum of eight bytes),word-aligned optional field the control connection can negotiate this as an additional level of guarantee beyond the regular cookielookup to make sure that a data message has been directed to the correct session or that any recentlyreused cookie will not be misdirected.

正确答案:A,B

第2题:

Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()

  • A、LDAP
  • B、ICMP
  • C、RTP
  • D、BGP
  • E、SSH
  • F、RDP

正确答案:B,D,E

第3题:

Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)

A. data integrity

B. data confidentiality

C. data authentication

D. outer IP header confidentiality

E. outer IP header authentication


参考答案:A, B, C

第4题:

What are three facts control plane policing? ()

  • A、a set of rules that can be established and associated with the ingress and egress ports of the control plane
  • B、improves performance of the control plane by marking control plane packets with DSCPEF
  • C、protects the control plane on a router from DoS attacks
  • D、treats the control plane as a separate entity with its own ingress (input) and egress (output) ports
  • E、provides the control plane with a separate token bucket
  • F、enhances security of the control plane by tunneling packets to and from the control plane

正确答案:A,C,D

第5题:

Cisco IOS XR software is partitioned into three planes: control, data, and management. Which three ofthese belong to the data plane?()

  • A、XML
  • B、RIB
  • C、FIB
  • D、QoS
  • E、PFI

正确答案:B,D,E

第6题:

Which three protocols should be explicitly managed by using Control Plane Policing on an Internet borderrouter?()

  • A、LDAP
  • B、ICMP
  • C、RTP
  • D、BGP
  • E、SSH
  • F、RDP

正确答案:B,D,E

第7题:

What are two benefits of control plane policing?()

  • A、protection against denial of service (DoS) attacks at infrastructure routers and switches
  • B、 protection against known worm attacks in routers and switches
  • C、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switches
  • D、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switches
  • E、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches

正确答案:A,D

第8题:

IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

A.network
B.transport
C.application
D.session

答案:C
解析:

第9题:

What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()

  • A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
  • B、 automatic reconfiguration s of the security devices based on current security threats
  • C、 containment and control of security threats
  • D、 application security
  • E、 anti-x defense F- virtual firewall

正确答案:C,D,E

第10题:

What are three benefits of using chassis clustering?()

  • A、Provides stateful session failover for sessions.
  • B、Increases security capabilities for IPsec sessions.
  • C、Provides active-passive control and data plane redundancy.
  • D、Enables automated fast-reroute capabilities.
  • E、Synchronizes configuration files and session state

正确答案:A,C,E

更多相关问题