A. IOS IPS B. Autosecure C. CSA D. Netflow E. IOS Network Foundation Protection (NFP) F. IOS Firewall
单项选择题WhenimplementingbestpracticesforIPSourceAddressSpoofingandDefeatingDenialofServiceAttackswithIPSourceAddressSpoofing,whatRFCiscommonlyusedtoprotectyournetwork?()
A. RFC 1149 B. RFC 3704 C. RFC 1918 D. RFC 2827
单项选择题WhenimplementinginternetstandardsyouarerequiredtofollowRFC’sprocessesandproceduresbasedonwhatRFC?()
A. RFC 1769 and mere publications B. Real standards of RFC 1918 C. RFC 1669 real standards andmere publications D. Real standards and mere publications RFC 1796 E. None of the above
单项选择题SinceHTTPisoneofthemostcommonprotocolsusedintheinternet,whatshouldbedoneatafirewallleveltoensurethattheprotocolisbeingused correctly?()
A. Ensure that a stateful firewall allows only HTTP traffic destined for valid web server IP addresses. B. Ensure that a firewall has SYN flood and DDoS protection applied specifically for valid web servers. C. Ensure that your firewall enforces HTTP protocol compliance to ensure that only valid flows are allowed inand outof your network. D. Ensure that HTTP is always authenticated. E. Ensure that your web server is in a different zone than your backend servers such as SQL and DNS.
单项选择题WhatCiscotechnologyprotectsagainstSpanning-TreeProtocolmanipulation?()
A. Spanning tree protect B. Root Guard and BPDU Guard C. Unicast Reverse Path Forwarding D. MAC spoof guard E. Port Security
单项选择题WhichofthefollowingisanexampleofasecuritytechnologythatcouldbeenabledbyNetflow?()
A. Anomaly Detection B. SYN Cookies C. Application Inspection D. Content filtering E. Anti-X Protection F. Anti Virus