Refer to the exhibit. Which two statements about the SDF Locations window of the IPS Rule wizard are true?()
A.An HTTP SDF file location can be specified by clicking the Add button.
B.If all specified SDF locations fail to load, the signature file that is named default.sdf will be loaded.
C.The Autosave feature automatically saves the SDF alarms if the router crashes.
D.The Autosave feature is automatically enabled for the default built-in signature file.
E.The name of the built-in signature file is default.sdf.
F.The Use Built-In Signatures (as backup) check box is selected by default.
您可能感興趣的試卷
你可能感興趣的試題
A.AlarmSeverity
B.AlarmKeepalive
C.AlarmTraits
D.EventMedia
E.EventAlarm
F.EventAction
A.A static route that points towards the Cisco Easy VPN server is created on the remote client.
B.A static route is created on the Cisco Easy VPN server for the internal IP address of each VPN client.
C.A default route is injected into the route table of the remote client.
D.A default route is injected into the route table of the Cisco Easy VPN server.
A.A received IP packet is forwarded based on the IP destination address and the packet is sent as an IP packet.
B.An IP destination exists in the IP forwarding table. A received labeled packet is dropped because the label is not found in the LFIB table.
C.There is an MPLS label-switched path toward the destination. A received IP packet is dropped because the destination is not found in the IP forwarding table.
D.A received IP packet is forwarded based on the IP destination address and the packet is sent as a labeled packet.
E.A received labeled IP packet is forwarded based upon both the label and the IP address.
F.A received labeled packet is forwarded based on the label. After the label is swapped,the newly labeled packet is sent.
A.network-based application recognition (NBAR)
B.authentication proxy
C.stateful packet filtering
D.AAA services
E.proxy server
F.IPS
Refer to the exhibit.
Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
A.The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B.The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C.The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D.The tunnel mode gre command must be configured on the Tunnel0 interface.
E.The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F.The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.
Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()
A.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed without going through the encrypted tunnel.
B.Any protected subnets that are entered represent subnets at the end user’s site that will be accessed through the encrypted tunnel.
C.Any protected subnets that are entered represent subnets at the VPN server site that will be accessed without going through the encrypted tunnel.
D.Any protected subnets that are entered represent subnets at the VPN server site that will be accessedthrough the encrypted tunnel.
A.All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
B.A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
C.Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
D.The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
A.Human interaction is required to facilitate the spread.
B.The worm executes arbitrary code and installs copies of itself in the memory of the infected computer.
C.Extremely large volumes of requests are sent over a network or over the Internet.
D.Data or commands are injected into an existing stream of data. That stream is passed between a client and server application.
A.All passwords entered during the AutoSecure configuration must be a minimum of 8 characters in length.
B.Cisco123 would be a valid password for both the enable password and the enable secret commands.
C.The auto secure command can be used to secure the router login as well as the NTP and SSH protocols.
D.For an interactive full session of AutoSecure, the auto secure login command should be used.
E.If the SSH server was configured, the 1024 bit RSA keys are generated after the auto secure commandis enabled.
A.Configure SNMP with only read-only community strings.
B.Encrypt TFTP and syslog traffic in an IPSec tunnel.
C.Implement RFC 3704 filtering at the perimeter router when allowing syslog access from devices on the outside of a firewall.
D.Synchronize the NTP master clock with an Internet atomic clock.
E.Use SNMP version 2.
F.Use TFTP version 3 or above because these versions support a cryptographic authentication mechanism between peers.
最新試題
Refer to the exhibit. MPLS has been configured on all routers in the domain. In order for R2 and R3 to forward frames between them with label headers, what additional configuration will be required on devices that are attached to the LAN segment?()
Which two mechanisms can be used to detect IPsec GRE tunnel failures?()
Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()
Which three statements about IOS Firewall configurations are true?()
Which statement about an IPS is true?()
During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()
Refer to the exhibit. Which order correctly identifies the steps to provision a cable modem to connect to a headend as defined by the DOCSIS standard?()
Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.Which command needs to be applied to the SOHO77 to complete the configuration?()
Which three statements about the Cisco Easy VPN feature are true?()
Refer to the exhibit.What are the two options that are used to provide High Availability IPsec?()