niusouti.com

单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()Asingle layer of firewallingBmultiple layers of 

题目
单选题
It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()
A

 single layer of firewalling

B

 multiple layers of firewalling

C

 firewall connections in either an active or standby state

D

 an architecture in which all traffic between firewalls goes through application-specific servers


相似考题
参考答案和解析
正确答案: A
解析: 暂无解析
更多“It’s a configuration that experts are calling a "firewall sa”相关问题
  • 第1题:

    Which configuration command limits the number of connections supported on a single PPPoE major interface?()

    A.sessions

    B.sa-validate

    C.split-horizon

    D.duplicate-protection


    参考答案:A

  • 第2题:

    You have been asked to configure a login class which will permit its users to view and edit the configuration. The class should only allow the configuration of the interfaces and firewall heirarchies. Which configuration correctly accomplishes this?()

    A.A

    B.B

    C.C

    D.D


    参考答案:B

  • 第3题:

    It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()

    • A、 single layer of firewalling
    • B、 multiple layers of firewalling
    • C、 firewall connections in either an active or standby state
    • D、 an architecture in which all traffic between firewalls goes through application-specific servers

    正确答案:B

  • 第4题:

    请问您是哪位?用英语最妥当的表述是()。

    • A、Who are you?
    • B、Hello.
    • C、What’s your name?
    • D、Who’s calling,please?

    正确答案:D

  • 第5题:

    How do objects pass messages in Java?()   

    • A、They pass messages by modifying each other’s member variables
    • B、They pass messages by modifying the static member variables of each other’s classes
    • C、They pass messages by calling each other’s instance member methods
    • D、They pass messages by calling static member methods of each other’s classes.

    正确答案:C

  • 第6题:

    Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }

    • A、ftp-group
    • B、ftp-users
    • C、firewall-user
    • D、nancy and walter

    正确答案:A

  • 第7题:

    What is the function of Host Checker?()

    • A、To allow clientless access to the network
    • B、To restrict access to protected resources on the network
    • C、To scan an endpointfor compliance with security policies
    • D、To push a firewall policy to the endpoint's local firewall application

    正确答案:B

  • 第8题:

    多选题
    Which three statements are true when configuring Cisco IOS Firewall features using the SDM? ()
    A

    A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.

    B

    An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.

    C

    Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.

    D

    Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.

    E

    The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.

    F

    The SDM provides a basic, intermediate, and advanced firewall wizard.


    正确答案: F,B
    解析: 暂无解析

  • 第9题:

    单选题
    For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM wizardthat performs similar configuration functions?()
    A

    aaa configuration commands and the SDM Basic Firewall wizard

    B

    setup exec command and the SDM Security Audit wizard

    C

    auto secure exec command and the SDM One-Step Lockdown wizard

    D

    Cisco Common Classification Policy Language configuration commands and the SDM Site-to- Site VPN


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    How do objects pass messages in Java?()
    A

    They pass messages by modifying each other’s member variables

    B

    They pass messages by modifying the static member variables of each other’s classes

    C

    They pass messages by calling each other’s instance member methods

    D

    They pass messages by calling static member methods of each other’s classes.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()
    A

    CLI

    B

    WebUI

    C

    NSM

    D

    Junos Pulse Access Control Service


    正确答案: B,A
    解析: 暂无解析

  • 第12题:

    单选题
    Under which configuration hierarchy is an access profile configured for firewall user authentication?()
    A

    [edit access]

    B

    [edit security access]

    C

    [edit firewall access]

    D

    [edit firewall-authentication]


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()

    A. sessions

    B. sa-validate

    C. split-horizon

    D. duplicate-protection


    参考答案:D

  • 第14题:

    “Calling once,calling twice,last calling”(翻译)()。


    正确答案:第一次,第二次,最后一次

  • 第15题:

    Which configuration command limits the number of connections supported on a single PPPoE major interface?()

    • A、sessions
    • B、sa-validate
    • C、split-horizon
    • D、duplicate-protection

    正确答案:A

  • 第16题:

    You work as a network engineer for the company, you want to configure two BGP speakers to form an EBGP session across a firewall. On the engineer’s network, the firewall always permits TCP sessions that are initiated from the inside network (the network attached to the inside interface of the firewall). What prerequisite is there for enabling BGP to run on this network?()

    • A、EBGP multihop will need to be configured for this to work.
    • B、This should work with normal BGP peering, with no additional configuration on the BGP speakers or the firewall.
    • C、The BGP protocol port must be opened on the firewall
    • D、There is no way to make BGP work across a firewall.

    正确答案:A

  • 第17题:

    Under which configuration hierarchy is an access profile configured for firewall user authentication?()

    • A、[edit access]
    • B、[edit security access]
    • C、[edit firewall access]
    • D、[edit firewall-authentication]

    正确答案:A

  • 第18题:

    Which configuration command prevents a client from establishing multiple PPPoE connections from a single workstation?()

    • A、sessions
    • B、sa-validate
    • C、split-horizon
    • D、duplicate-protection

    正确答案:D

  • 第19题:

    单选题
    Given the configuration shown in the exhibit, which configuration object would be used to associate bothNancy and Walter with firewall user authentication within a security policy?() profile ftp-users { client nancy { firewall-user { password "$9$lJ8vLNdVYZUHKMi.PfzFcyrvX7"; ## SECRET-DATA } } client walter { firewall-user { password "$9$a1UqfTQnApB36pBREKv4aJUk.5QF"; ## SECRET-DATA } } session-options { client-group ftp-group; } } firewall-authentication { pass-through { default-profile ftp-users;ftp { banner { login "JUNOS Rocks!"; } } } }
    A

    ftp-group

    B

    ftp-users

    C

    firewall-user

    D

    nancy and walter


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    When is an IPSec SA built on the Teleworker Router?()
    A

    when the router is booted up

    B

    when the router administratively does a no shutdown on the IPSec SA 

    C

    when traffic matches a line of the access-list tied into the crypto-map in the router configuration, and that particular IPSec SA is not already up 

    D

    when the ISAKMP SA completes negotiation of all IPSec SAs (one per access-list line in the crypto ACL), it will be brought up immediately


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()
    A

     single layer of firewalling

    B

     multiple layers of firewalling

    C

     firewall connections in either an active or standby state

    D

     an architecture in which all traffic between firewalls goes through application-specific servers


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    It has been unusually cold this winter and experts say it’s not _____.
    A

    normal

    B

    different

    C

    necessary

    D

    important


    正确答案: A
    解析:
    句意:今年冬天异常寒冷,专家说这是不正常的。本题考查形容词词义辨析。由题干中的“unusually cold”可知,这里应该是说这种冷是不正常的。normal表示“正常的”,not normal表示“不正常的”,符合句意。因此A项正确。different不同的。necessary必要的。important重要的。

  • 第23题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?()
    A

    Individual clients are configured under client groups in the configuration hierarchy.

    B

    Client groups are configured under individual clients in the configuration hierarchy.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第24题:

    问答题
    What’s the attitude of the writer towards the advice experts give?

    正确答案: Sarcastic.
    解析:
    作者态度题。文章第六到十一段讨论了专家的建议,第十一段中“The reason this advice is so hopeless is that it is trying to eliminate anger.”意思是“这个建议很无效的理由在于,它试图消除愤怒”,作者对于这些建议并不认同,持否定态度。从文章中“It keeps me alive, but that’s as far as it goes”和“Again, no dice: I don’t forgive the water machine and I don’t forgive my colleague.”等可以看出,作者对于这些建议怀有讥讽的意思。