Firewall is a _______ mechanism used by organizations to protect their LANs from the Internet.
A.reliable
B.stable
C.peaceful
D.Security
A.
B.
C.
D.
第1题:
A. rate limiting of ICMP
B. RADIUS authorizations
C. source address validation
D. stateful firewall on the router
第2题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
A. from source-port
B. from source-address
C. from destination-address
D. from destination-port
第3题:
Firewall is a(74) mechanism used by organizations to protect their LANs from the Internet.
A.reliable
B.stable
C.peaceful
D.security
第4题:
Chafing gear(防摩擦装置) is used to______.
A.anchor the boat
B.pick up heavy loads
C.protect fiber rope from abrasion
D.strengthen mooring lines
第5题:
Kort nozzles are installed around the propellers of some vessels to ______.
A.increase the thrust of the propeller
B.protect the propeller from striking sawyers
C.protect the propeller from striking barges towed on the hip
D.protect the propeller from touching bottom in low water
第6题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
第7题:
Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()
第8题:
While performing a site survey to document the existing environment before implementing a new HACMP cluster, it was discovered that a port filtering firewall was being used to protect the production system. The plan is to continue using the firewall and add a second firewall to avoid a single point of failure. Each node in the two-node cluster will have all of its network adapters connected to the firewalls, and all connections to the nodes will pass through these firewalls. What must be considered about HACMP in a firewall environment?()
第9题:
You have a firewall filter containing two terms applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. What match criterion should be used in the first term of the filter?()
第10题:
stop valves
check valves
safety valves
reducing valves
第11题:
damage from crane operations
being used for wash down purposes
accidental diversion of flow to wrong location
freezing
第12题:
To watch for bandwidth issues
To protect the server from all traffic
To block certain traffic by ports
To monitor certain malicious traffic
第13题:
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
A. then reject
B. then discard
C. then next filter
D. then silent-drop
第14题:
A. Firewall filters are stateless.
B. Firewall filters are used to control routing information that is exchanged between devices.
C. Firewall filters are used to control traffic passing through the device.
D. Firewall filters can only be applied to traffic entering the device.
第15题:
In towing,chocks are used to ______.
A.protect the towline from chafing
B.secure the end of the towline on the tug
C.stop off the towline while retrieving it
D.absorb shock loading on the towline
第16题:
Flame screens are used to ______.
A.contain flammable fumes
B.protect firefightiers from flames
C.prevent flames from entering tanks
D.keep flame and sparks from getting out of an engine’s exhaust system
第17题:
Which three techniques should be used to secure management protocols?()
第18题:
What are three applications for firewall filters in JUNOS software?()
第19题:
Which of the following is the BEST reason to implement a firewall on a server?()
第20题:
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()
第21题:
Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)
第22题:
It needs not to be regularly replaced
It is designed to protect from possible impact
It is required to be worn on deck at all times by all ships
fibreglass hardhat should not be used on board ships
第23题:
ship's sweat
inherent vice
tainting
hygroscopic absorption