当前位置:CCIE系列认证综合练习题库

问题:

[问答题] What is the next state of initial in spanning-tree protocol?

Which two statements apply to dynamic access lists?() [" they offer simpler management in large internetworks."," you can control logging messages."," they allow packets to be filtered based on upper-layer session information."," you can set a time-based security policy."," they provide a level of security against spoofing."," they are used to authenticate individual users."] 变压器并列运行应满足哪些条件? Which two statements about common network attacks are true?() ["Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.","Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.","Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.","Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.","Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.","Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries."] 纹层(细层) Which of these statements regarding Cisco’s WebVPN support is correct?() [" Cisco ISR Routers with the Enhanced Security Bundles support WebVPN."," Cisco security appliances act as a proxy between the end user and the target web server."," Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN."," Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support."] What is the next state of initial in spanning-tree protocol?
参考答案:

  参考解析

本题暂无解析

在线 客服