A. set routing-options static route 10.1.1.1/32 no-retain
B. set routing-options static route 10.1.1.1/32 discard
C. set routing-options static route 10.1.1.1/32 reject
D. set routing-options static route 10.1.1.1/32 no-install
第1题:
Drop () whenever you have time. You are always welcome.
A、in
B、down
C、off
D、out
第2题:
数据链路层在物理层提供比特流传输服务的基础上在通信的实体之间建立数据链路连接,传送的数据单元是
A.比特(bit) B.帧(frame) C.分组(packet) D.报文(message)
第3题:
A.IPsecsite-to-siteVPN
B.CiscoAutoSecure
C.CiscoIOSFirewall
D.IPS
第4题:
Youhavebeencontractedtocreateawebsiteforafreedatingservice.Onefeatureistheabilityforoneclienttosendamessagetoanotherclient,whichisdisplayedinthelatterclient’sprivatepage.Your contractexplicitlystatesthatsecurityisahighpriority.Therefore,youneedtopreventcross-sitehackinginwhichoneuserinsertsJavaScriptcodethatisthenrenderedandinvokedwhenanotheruserviewsthatcontent.WhichtwoJSTLcodesnippetswillpreventcrosssitehackinginthescenarioabove?()
A.<c:out>${message}</c:out>
B.<c:outvalue=’${message}’/>
C.<c:outvalue=’${message}’escapeXml=’true’/>
D.<c:outeliminateXml=’true’>${message}</c:out>
E.<c:outvalue=’${message}’eliminateXml=’true’/>
第5题:
Melissa and Love Letter made use of the trust that exists between friends or colleagues. Imagine receiving an(66)from a friend who asks you to open it. This is what happens with Melissa and several other similar email(67).Upon running, such worms usually proceed to send themselves out to email addresses from the victim' s address book ,previous emails, web pages(68).
As administrators seek to block dangerous email attachments through the recognition of well- known (69), virus writers use other extensions to circumvent such protection. Executable (.exe) files are renamed to . bat and . cnd plus a whole list of other extensions and will still run and successfully infect target users. Frequently, hackers try to penetrate networks by sending an attachment that looks like a flash movie, which, while displaying some cute animation, simultaneously runs commands in the background to steal your passwords and give the(70)access to your network.
A.attachment
B.paeket
C.datagram
D.message
第6题:
关于Packet-out消息描述不正确的是()
A.Packet-out消息可以用于指定某一个数据包的处理方法
B.控制器可以使用Packet-out消息,告诉交换机网络中如ARP、IGMP等数据包如何处理
C.Packet-out消息由OpenFlow控制器发出并发送到OpenFlow交换机
D.当用于链路发现时,控制器向一个交换机发送Packet-out消息,actions为从交换机的所有端口转发