单选题Which parameters are valid SCREEN options for combating operating system probes?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag

题目
单选题
Which parameters are valid SCREEN options for combating operating system probes?()
A

syn-fin, syn-flood, and tcp-no-frag

B

syn-fin, port-scan, and tcp-no-flag

C

syn-fin, fin-no-ack, and tcp-no-frag

D

syn-fin, syn-ack-ack-proxy, and tcp-no-frag


相似考题
更多“单选题Which parameters are valid SCREEN options for combating operating system probes?()A syn-fin, syn-flood, and tcp-no-fragB syn-fin, port-scan, and tcp-no-flagC syn-fin, fin-no-ack, and tcp-no-fragD syn-fin, syn-ack-ack-proxy, and tcp-no-frag”相关问题
  • 第1题:

    Which of the following is a valid source for Windows operating system updates?()

    • A、SNA
    • B、RIS
    • C、RAS
    • D、WSUS

    正确答案:D

  • 第2题:

    Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()

    • A、 HTTP
    • B、 Java scripting
    • C、 TCL scripting
    • D、 RADIUS
    • E、 TACACS

    正确答案:A,C,D

  • 第3题:

    When configuring the messaging system, which of the following are valid parameters for the file transport? ()

    • A、File Name
    • B、Operating System
    • C、Location
    • D、Host
    • E、Mode

    正确答案:A,C,E

  • 第4题:

    Which two statements about the use of SCREEN options are correct?()

    • A、SCREEN options are deployed at the ingress and egress sides of a packet flow.
    • B、Although SCREEN options are very useful, their use can result in more session creation.
    • C、SCREEN options offer protection against various attacks at the ingress zone of a packet flow.
    • D、SCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.

    正确答案:C,D

  • 第5题:

    Which parameters are valid SCREEN options for combating operating system probes?()

    • A、syn-fin, syn-flood, and tcp-no-frag
    • B、syn-fin, port-scan, and tcp-no-flag
    • C、syn-fin, fin-no-ack, and tcp-no-frag
    • D、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

    正确答案:C

  • 第6题:

    You plan to take a closed database backup using operating system commands. Which three SHUTDOWN options are appropriate for this type of backup?()

    • A、ABORT
    • B、NORMAL
    • C、IMMEDIATE
    • D、TRANSACTIONAL

    正确答案:B,C,D

  • 第7题:

    多选题
    Which three advanced permit actions within security policies are valid?()
    A

    Mark permitted traffic for firewall user authentication.

    B

    Mark permitted traffic for SCREEN options.

    C

    Associate permitted traffic with an IPsec tunnel.

    D

    Associate permitted traffic with a NAT rule.

    E

    Mark permitted traffic for IDP processing.


    正确答案: C,E
    解析: 暂无解析

  • 第8题:

    多选题
    Which are valid statements about Cisco Virtual Interface Card (VIC)? ()
    A

    The Cisco VIC can create an unlimited number of Virtual NICs

    B

    The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinks

    C

    vNICs are created using software on the host operating system

    D

    The host operating system sees a vNIC as a physical PCIe device

    E

    The host operating system sees a vNIC as a sub-interface of a primary NIC

    F

    The Cisco VIC can create 1024 vNICs


    正确答案: F,A
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following is a valid source for Windows operating system updates?()
    A

    SNA

    B

    RIS

    C

    RAS

    D

    WSUS


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()
    A

    HTTP

    B

    Java scripting

    C

    TCL scripting

    D

    RADIUS

    E

    TACACS


    正确答案: E,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which of the following options are valid choices for cluster communication security?()
    A

    rsh and ssh

    B

    Standard and VPN

    C

    rhost and .shosts

    D

    Classic and Enhanced


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which view shows all valid values for the NLS_LANGUAGE, NLS_SORT, NLS_TERRITORY,and NLS_CHARACTERSET parameters?()
    A

    V$VALID_NLS_VALUES

    B

    NLS_VALID_VALUES

    C

    NLS_VALUE_OPTIONS

    D

    V$NLS_VALUE_OPTIONS

    E

    V$NLS_VALID_VALUES


    正确答案: E
    解析: 暂无解析

  • 第13题:

    Which two statements about the use of SCREEN options are correct? ()(Choose two.)

    • A、SCREEN options offer protection against various attacks
    • B、SCREEN options are deployed prior to route and policy processing in first path packet processing
    • C、SCREEN options are deployed at the ingress and egress sides of a packet flow
    • D、SCREEN options, you must take special care to protect OSPF

    正确答案:A,B

  • 第14题:

    Which of the following will help protect an operating system from vulnerability?()

    • A、Download free anti-virus programs from the Internet.
    • B、Perform updates from the manufacturers website regularly.
    • C、Using the operating systems email program only to open attachments.
    • D、Monitoring what is displayed on the screen.

    正确答案:B

  • 第15题:

    Which two functions of JUNOS Software are handled by the data plane?()

    • A、NAT
    • B、OSPF
    • C、SNMP
    • D、SCREEN options

    正确答案:A,D

  • 第16题:

    Which parameters must you select when configuring operating system probes SCREEN options?()

    • A、syn-fin, syn-flood, and tcp-no-frag
    • B、syn-fin, port-scan, and tcp-no-flag
    • C、syn-fin, fin-no-ack, and tcp-no-frag
    • D、syn-fin, syn-ack-ack-proxy, and tcp-no-frag

    正确答案:C

  • 第17题:

    Which three advanced permit actions within security policies are valid?()

    • A、Mark permitted traffic for firewall user authentication.
    • B、Mark permitted traffic for SCREEN options.
    • C、Associate permitted traffic with an IPsec tunnel.
    • D、Associate permitted traffic with a NAT rule.
    • E、Mark permitted traffic for IDP processing.

    正确答案:A,C,E

  • 第18题:

    多选题
    Which of these are valid Flashback Database recovery point parameters?()
    A

    SCN

    B

    Timestamp

    C

    Named recovery point

    D

    Transaction ID

    E

    Session ID


    正确答案: D,B
    解析: 暂无解析

  • 第19题:

    单选题
    Which of the following will help protect an operating system from vulnerability?()
    A

    Download free anti-virus programs from the Internet.

    B

    Perform updates from the manufacturers website regularly.

    C

    Using the operating systems email program only to open attachments.

    D

    Monitoring what is displayed on the screen.


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following BEST describes the initial process of setting up a new operating system from a CD-ROM? ()
    A

    Format a partition, install device drivers, and install the operating system.

    B

    Create a partition, format the partition, and install the operating system.

    C

    Install the operating system, create a partition, and install device drivers.

    D

    Install the operating system, install device drivers, and create a partition.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    Which parameters are valid SCREEN options for combating operating system probes?()
    A

    syn-fin, syn-flood, and tcp-no-frag

    B

    syn-fin, port-scan, and tcp-no-flag

    C

    syn-fin, fin-no-ack, and tcp-no-frag

    D

    syn-fin, syn-ack-ack-proxy, and tcp-no-frag


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following is a software layer that interacts between the virtualized operating system and the physical hardware?()
    A

     System Resource Manager

    B

     Server BIOS

    C

     Guest Operating System

    D

     Hypervisor


    正确答案: C
    解析: 暂无解析

  • 第23题:

    多选题
    When configuring the messaging system, which of the following are valid parameters for the file transport? ()
    A

    File Name

    B

    Operating System

    C

    Location

    D

    Host

    E

    Mode


    正确答案: C,A
    解析: 暂无解析

  • 第24题:

    单选题
    Which parameters must you select when configuring operating system probes SCREEN options?()
    A

    syn-fin, syn-flood, and tcp-no-frag

    B

    syn-fin, port-scan, and tcp-no-flag

    C

    syn-fin, fin-no-ack, and tcp-no-frag

    D

    syn-fin, syn-ack-ack-proxy, and tcp-no-frag


    正确答案: B
    解析: 暂无解析