单选题Which parameters are valid SCREEN options for combating operating system probes?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag

题目
单选题
Which parameters are valid SCREEN options for combating operating system probes?()
A

syn-fin, syn-flood, and tcp-no-frag

B

syn-fin, port-scan, and tcp-no-flag

C

syn-fin, fin-no-ack, and tcp-no-frag

D

syn-fin, syn-ack-ack-proxy, and tcp-no-frag

参考答案和解析
正确答案: B
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which parameters must you select when configuring operating system probes SCREEN options?()

A. syn-fin, syn-flood, and tcp-no-frag

B. syn-fin, port-scan, and tcp-no-flag

C. syn-fin, fin-no-ack, and tcp-no-frag

D. syn-fin, syn-ack-ack-proxy, and tcp-no-frag


参考答案:C

第2题:

Which of the following is a valid source for Windows operating system updates?()

  • A、SNA
  • B、RIS
  • C、RAS
  • D、WSUS

正确答案:D

第3题:

Which parameters are valid SCREEN options for combating operating system probes?()

A. syn-fin, syn-flood, and tcp-no-frag

B. syn-fin, port-scan, and tcp-no-flag

C. syn-fin, fin-no-ack, and tcp-no-frag

D. syn-fin, syn-ack-ack-proxy, and tcp-no-frag


参考答案:C

第4题:

When configuring the messaging system, which of the following are valid parameters for the file transport? ()

  • A、File Name
  • B、Operating System
  • C、Location
  • D、Host
  • E、Mode

正确答案:A,C,E

第5题:

Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()

  • A、 HTTP
  • B、 Java scripting
  • C、 TCL scripting
  • D、 RADIUS
  • E、 TACACS

正确答案:A,C,D

第6题:

Which are valid statements about Cisco Virtual Interface Card (VIC)? ()

  • A、 The Cisco VIC can create an unlimited number of Virtual NICs
  • B、 The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinks
  • C、 vNICs are created using software on the host operating system
  • D、 The host operating system sees a vNIC as a physical PCIe device
  • E、 The host operating system sees a vNIC as a sub-interface of a primary NIC
  • F、 The Cisco VIC can create 1024 vNICs

正确答案:B,D

第7题:

Which two statements about the use of SCREEN options are correct? ()(Choose two.)

  • A、SCREEN options offer protection against various attacks
  • B、SCREEN options are deployed prior to route and policy processing in first path packet processing
  • C、SCREEN options are deployed at the ingress and egress sides of a packet flow
  • D、SCREEN options, you must take special care to protect OSPF

正确答案:A,B

第8题:

Which two statements about the use of SCREEN options are correct? ()(Choose two.)

A. SCREEN options offer protection against various attacks

B. SCREEN options are deployed prior to route and policy processing in first path packet processing

C. SCREEN options are deployed at the ingress and egress sides of a packet flow

D. SCREEN options, you must take special care to protect OSPF


参考答案:A, B

第9题:

Which of the following will help protect an operating system from vulnerability?()

  • A、Download free anti-virus programs from the Internet.
  • B、Perform updates from the manufacturers website regularly.
  • C、Using the operating systems email program only to open attachments.
  • D、Monitoring what is displayed on the screen.

正确答案:B

第10题:

Which two functions of JUNOS Software are handled by the data plane?()

  • A、NAT
  • B、OSPF
  • C、SNMP
  • D、SCREEN options

正确答案:A,D

更多相关问题