You must configure a SCREEN option that would protect your device from a session table flood.Which configuration meets this requirement?()
A.A B.B C.C D.D
单项选择题PriortoapplyingSCREENoptionstodroptraffic,youwanttodeterminehowyourconfigurationwillaffect traffic.Whichmechanismwouldyouconfiguretoachievethisobjective?()
A.the log option for the particular SCREEN option B.the permit option for the particular SCREEN option C.the SCREEN option, because it does not drop traffic by default D.the alarm-without-drop option for the particular SCREEN option
单项选择题WheredoyouconfigureSCREENoptions?()
A.zones on which an attack might arrive B.zones you want to protect from attack C.interfaces on which an attack might arrive D.interfaces you want to protect from attack
单项选择题AnattackersendsalowrateofTCPSYNsegmentstohosts,hopingthatatleastoneportreplies.Which typeofanattackdoesthisscenariodescribe?()
A.DoS B.SYN flood C.port scanning D.IP address sweep
多项选择题Whatarethreemainphasesofanattack?()
A.DoS B.exploit C.propagation D.port scanning E.reconnaissance
多项选择题WhichtwostatementsabouttheuseofSCREENoptionsarecorrect?()
A.SCREEN options are deployed at the ingress and egress sides of a packet flow. B.Although SCREEN options are very useful, their use can result in more session creation. C.SCREEN options offer protection against various attacks at the ingress zone of a packet flow. D.SCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.