单选题与QQ相关的过滤器属于下列哪一类?()A Misuse and AbuseB Port Scan/Host SweepC Traffic NormalizationD Traffic Thresholds

题目
单选题
与QQ相关的过滤器属于下列哪一类?()
A

Misuse and Abuse

B

Port Scan/Host Sweep

C

Traffic Normalization

D

Traffic Thresholds


相似考题
更多“单选题与QQ相关的过滤器属于下列哪一类?()A Misuse and AbuseB Port Scan/Host SweepC Traffic NormalizationD Traffic Thresholds”相关问题
  • 第1题:

    On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN.access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 anyHow will the above access lists affect traffic?()

    A. All traffic will be allowed to exit E0 except FTP traffic.

    B. FTP traffic from 192.168.166.19 to any host will be denied.

    C. FTP traffic from 192.168.166.22 to any host will be denied.

    D. All traffic exiting E0 will be denied.

    E. All FTP traffic to network 192.168.166.18/29 from any host will be denied.


    参考答案:D

  • 第2题:

    A vessel outbound from a port or pilot station within an inshore traffic zone is recommended to ______.

    A.call at a port,pilot station,destination or sheltered anchorage

    B.use the appropriate lane other than the adjacent traffic separation scheme

    C.use the inshore traffic zone

    D.join the adjacent traffic lane as soon as possible


    正确答案:D

  • 第3题:

    What does the interface subcommand switchport voice vlan 222 indicate?()

    • A、The port is configured for both data and voice traffic.
    • B、The port is fully dedicated to forwarding voice traffic.
    • C、The port will operate as an FXS telephony port.
    • D、Voice traffic will be redirected to VLAN 222.

    正确答案:A

  • 第4题:

    Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a inthe HR zone to host_b in the trust zone are true?() [edit security policies from-zone HR to-zone trust] user@host# show policy one { match { source-address any; destination-address any; application [ junos-http junos-ftp ]; } then { permit; } } policy two { match { source-address host_a; destination-address host_b; application [ junos-http junos-smtp ]; } then { deny; } }

    • A、DNS traffic is denied.
    • B、HTTP traffic is denied.
    • C、FTP traffic is permitted.
    • D、SMTP traffic is permitted.

    正确答案:A,C

  • 第5题:

    How will the above access lists affect traffic?()

    • A、FTP traffic from 192.169.1.22 will be denied
    • B、No traffic, except for FTP traffic will be allowed to exit E0
    • C、FTP traffic from 192.169.1.9 to any host will be denied
    • D、All traffic exiting E0 will be denied
    • E、All FTP traffic to network 192.169.1.9/29 will be denied

    正确答案:D

  • 第6题:

    与QQ相关的过滤器属于下列哪一类?()

    • A、Misuse and Abuse
    • B、Port Scan/Host Sweep
    • C、Traffic Normalization
    • D、Traffic Thresholds

    正确答案:A

  • 第7题:

    Which statement describes exception traffic?()

    • A、Exception traffic must be sent to the PFE for processing.
    • B、Exception traffic enters one ingress port and is sent out multiple egress ports.
    • C、Exception traffic is rate-limited on the internal link to prevent DoS attacks.
    • D、Exception traffic is processed after forwarding traffic when congestion exists.

    正确答案:C

  • 第8题:

    单选题
    On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN. access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 any How will the above access lists affect traffic?()
    A

    All traffic will be allowed to exit E0 except FTP traffic.

    B

    FTP traffic from 192.168.166.19 to any host will be denied.

    C

    FTP traffic from 192.168.166.22 to any host will be denied.

    D

    All traffic exiting E0 will be denied.

    E

    All FTP traffic to network 192.168.166.18/29 from any host will be denied.


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()
    A

    It sends the traffic through one egress port toward its destination

    B

    It sends the traffic through multiple egress ports to all available receivers

    C

    It sends the traffic through an internal link to the RE

    D

    It sends the traffic to the local system for further processing


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN: access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 any access-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 any What effect will this access list have?()
    A

    All traffic will be allowed to exit E0 except FTP traffic.

    B

    FTP traffic from 192.168.1.22 to any host will be denied.

    C

    FTP traffic from 192.168.1.9 to any host will be denied.

    D

    All traffic exiting E0 will be denied.

    E

    All FTP traffic to network 192.168.1.8/29 from any host will be denied.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which statement describes exception traffic?()
    A

    Exception traffic must be sent to the PFE for processing.

    B

    Exception traffic enters one ingress port and is sent out multiple egress ports.

    C

    Exception traffic is rate-limited on the internal link to prevent DoS attacks.

    D

    Exception traffic is processed after forwarding traffic when congestion exists.


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    How will the above access lists affect traffic?()
    A

    FTP traffic from 192.169.1.22 will be denied

    B

    No traffic, except for FTP traffic will be allowed to exit E0

    C

    FTP traffic from 192.169.1.9 to any host will be denied

    D

    All traffic exiting E0 will be denied

    E

    All FTP traffic to network 192.169.1.9/29 will be denied


    正确答案: E
    解析: 暂无解析

  • 第13题:

    How will the above access lists affect traffic?()

    A.FTP traffic from 192.169.1.22 will be denied

    B.No traffic, except for FTP traffic will be allowed to exit E0

    C.FTP traffic from 192.169.1.9 to any host will be denied

    D.All traffic exiting E0 will be denied

    E.All FTP traffic to network 192.169.1.9/29 will be denied


    参考答案:D

  • 第14题:

    根据过滤器的响应动作类型分类:告警日志(AlertLog)、阻断日志(BlockLog)、误用日志(Misuse and AbuseLog)、流量门限日志(Traffic Threshold Reports)。()


    正确答案:错误

  • 第15题:

    How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()

    • A、It sends the traffic through one egress port toward its destination
    • B、It sends the traffic through multiple egress ports to all available receivers
    • C、It sends the traffic through an internal link to the RE
    • D、It sends the traffic to the local system for further processing

    正确答案:A

  • 第16题:

    Which statement describes transit traffic?()

    • A、Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.
    • B、Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.
    • C、Any traffic that requires the generation of an ICMP message.
    • D、Traffic that requires some form of special attention and does not pass through the device.

    正确答案:B

  • 第17题:

    The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()

    • A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.
    • B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.
    • C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.
    • D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.
    • E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

    正确答案:B,C

  • 第18题:

    A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()

    • A、NIC filtering is enabled.
    • B、Port security is configured.
    • C、NIC is not in promiscuous mode.
    • D、NIC is in promiscuous mode.

    正确答案:C

  • 第19题:

    Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.

    • A、DNS traffic is denied.
    • B、Telnet traffic is denied.
    • C、SMTP traffic is denied.
    • D、Ping traffic is permitted

    正确答案:B

  • 第20题:

    单选题
    Given the configuration shown in the exhibit, which statement is true about traffic from host_ato host_b?() [edit security policies from-zone HR to-zone trust] user@host# showpolicy two { match { source-address subnet_a; destination-address host_b; application [ junos-telnet junos-ping ]; } then { reject; } } policy one { match { source-address host_a; destination-address subnet_b; application any; } then { permit; } } host_a is in subnet_a and host_b is in subnet_b.
    A

    DNS traffic is denied.

    B

    Telnet traffic is denied.

    C

    SMTP traffic is denied.

    D

    Ping traffic is permitted


    正确答案: C
    解析: 暂无解析

  • 第21题:

    判断题
    根据过滤器的响应动作类型分类:告警日志(AlertLog)、阻断日志(BlockLog)、误用日志(Misuse and AbuseLog)、流量门限日志(Traffic Threshold Reports)。()
    A

    B


    正确答案:
    解析: 暂无解析

  • 第22题:

    单选题
    What does the interface subcommand switchport voice vlan 222 indicate?()
    A

    The port is configured for both data and voice traffic.

    B

    The port is fully dedicated to forwarding voice traffic.

    C

    The port will operate as an FXS telephony port.

    D

    Voice traffic will be redirected to VLAN 222.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()
    A

     NIC filtering is enabled.

    B

     Port security is configured.

    C

     NIC is not in promiscuous mode.

    D

     NIC is in promiscuous mode.


    正确答案: D
    解析: 暂无解析

  • 第24题:

    单选题
    与QQ相关的过滤器属于下列哪一类?()
    A

    Misuse and Abuse

    B

    Port Scan/Host Sweep

    C

    Traffic Normalization

    D

    Traffic Thresholds


    正确答案: B
    解析: 暂无解析