niusouti.com

多选题Which two statements are true regarding proxy ARP?()AProxy ARP is enabled by default.BProxy ARP is not enabled by default.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to

题目
多选题
Which two statements are true regarding proxy ARP?()
A

Proxy ARP is enabled by default.

B

Proxy ARP is not enabled by default.

C

JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.

D

JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled


相似考题
更多“多选题Which two statements are true regarding proxy ARP?()AProxy ARP is enabled by default.BProxy ARP is not enabled by default.CJUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.DJUNOS security devices can reply to”相关问题
  • 第1题:

    ARP Proxy主要是通过代理的方式来解决网络互通的问题,ARP Proxy以分为下面几种?()

    A.路由式ARP Proxy

    B.VLAN 内ARP Proxy

    C.二层ARP Proxy

    D.VLAN 间ARP Proxy


    参考答案:A, B, D

  • 第2题:

    In a Bridged 1483 network, an ISP has received complaints from their subscribers of denial of service attacks. The ISP suspects these attacks are coming from other subscribers that share the same IP unnumbered interface on the ERX. What can be done to solve this problem?()

    • A、Enable Proxy ARP.
    • B、Disable Proxy ARP.
    • C、Enable Inverse ARP.
    • D、Disable Inverse ARP.

    正确答案:B

  • 第3题:

    Which statement about Frame Relay is not true?()

    • A、Static mapping is used when the remote router does not support Inverse ARP.
    • B、Frame Relay Inverse ARP requires LMI capability to construct an address to the DLCI mapping tableon the router.
    • C、Frame Relay Inverse ARP is disabled by default in Cisco IOS Software for all protocols that areenabled on the physical interface.
    • D、Inverse ARP does not work when LMI is disabled.
    • E、Frame Relay provides forward and backward congestion notification messages

    正确答案:C

  • 第4题:

    The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()

    • A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.
    • B、 Port scanners are the most effective defense against dynamic ARP inspection.
    • C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.
    • D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.
    • E、 DHCP snooping sends unauthorized replies to DHCP queries.
    • F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
    • G、 None of the other alternatives apply.

    正确答案:A

  • 第5题:

    Which of the following processes, is used to find the hardware address of a LAN device?()

    • A、Inverse-ARP
    • B、Reverse-ARP
    • C、Proxy ARP
    • D、ARP

    正确答案:D

  • 第6题:

    Which three statements are true when working with high-availability clusters? (Choose three.)()

    • A、The valid cluster-id range is between 0 and 255.
    • B、Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.
    • C、If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.
    • D、A reboot is required if the cluster-id or node value is changed.
    • E、Junos OS security devices can belong to one cluster only.

    正确答案:C,D,E

  • 第7题:

    Which two statements are true regarding proxy ARP?()

    • A、Proxy ARP is enabled by default.
    • B、Proxy ARP is not enabled by default.
    • C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
    • D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

    正确答案:B,D

  • 第8题:

    单选题
    The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()
    A

     MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.

    B

     Port scanners are the most effective defense against dynamic ARP inspection.

    C

     MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.

    D

     Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.

    E

     DHCP snooping sends unauthorized replies to DHCP queries.

    F

     ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.

    G

     None of the other alternatives apply.


    正确答案: C
    解析: 暂无解析

  • 第9题:

    多选题
    Which three statements are true when working with high-availability clusters?()
    A

    The valid cluster-id range is between 0 and 255.

    B

    JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.

    C

    If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.

    D

    A reboot is required if the cluster-id or node value is changed.

    E

    JUNOS security devices can belong to one cluster only.


    正确答案: C,E
    解析: 暂无解析

  • 第10题:

    多选题
    如果用户属于不同的VLAN,可以使用VLAN间Proxy ARP技术,关于VLAN间Proxy ARP技术说法错误的是()
    A

    交换机的接口使能了VLAN间Proxy ARP功能之后,接口再接收到目的地址不是自己的ARP请求报文后,交换机会立即丢弃该报文

    B

    使能VLAN间Proxy ARP之后,交换机会将自己的MAC地址无条件发送给ARP请求方

    C

    VLAN间Proxy ARP主要用于处于不同VLAN的用户进行三层通信

    D

    也可在Super VLAN对应的VLANIF接口上启动VLAN间Proxy ARP功能,实现Sub VLAN间用户互通


    正确答案: C,A
    解析: 暂无解析

  • 第11题:

    多选题
    Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.()
    A

    Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCI

    B

    Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop protoco address or the DLCI for outgoing traffic

    C

    Inverse ARP is enabled by default for all protocols enabled on the physical interface

    D

    Inverse ARP is configured using the following command under the Interface configuration ’frame-relaymap dlci (dlci number) protocol protocol-address’

    E

    Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet


    正确答案: A,B,C
    解析: 暂无解析

  • 第12题:

    单选题
    Which statement is true regarding proxy ARP?()
    A

    Proxy ARP is enabled by default on stand-alone JUNOS security devices.

    B

    Proxy ARP is enabled by default on chassis clusters.

    C

    JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.

    D

    JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled


    正确答案: C
    解析: 暂无解析

  • 第13题:

    Select the 3 best answers describing operation and configuration of Frame-Relay Inverse ARP.()

    • A、Dynamic address mapping uses Frame Relay Inverse ARP to request the next-hop protocol address for a specific connection on its known DLCI
    • B、Responses to Inverse ARP requests are entered in an address-to-DLCI mapping table on the router or access server which is used to supply the next-hop protoco address or the DLCI for outgoing traffic
    • C、Inverse ARP is enabled by default for all protocols enabled on the physical interface
    • D、Inverse ARP is configured using the following command under the Interface configuration ’frame-relaymap dlci (dlci number) protocol protocol-address’
    • E、Inverse ARP in Frame-Relay is synonymous of ARP in Ethernet

    正确答案:A,B,C

  • 第14题:

    Which one of the protocols below allows a router to respond to an ARP request destined to a remote host?()

    • A、Gateway DP
    • B、Reverse ARP
    • C、proxy ARP
    • D、Inverse ARP
    • E、indirect ARP

    正确答案:C

  • 第15题:

    Which three statements best describe HSRP configuration on Cisco Nexus switches?()

    • A、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.
    • B、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.
    • C、 You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.
    • D、 You can use the show standby command to verify HSRP operation and configuration.
    • E、 If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

    正确答案:A,C,E

  • 第16题:

    Which statement is true regarding proxy ARP?()

    • A、Proxy ARP is enabled by default on stand-alone JUNOS security devices.
    • B、Proxy ARP is enabled by default on chassis clusters.
    • C、JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.
    • D、JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled

    正确答案:D

  • 第17题:

    When two hosts are trying to communicate across a network, how does the host originating thecommunication determine the hardware address of the host that it wants to "talk" to?()

    • A、RARP request
    • B、Show Network Address request
    • C、Proxy ARP request
    • D、ARP request
    • E、Show Hardware Address request

    正确答案:D

  • 第18题:

    Which three statements are true when working with high-availability clusters?()

    • A、The valid cluster-id range is between 0 and 255.
    • B、JUNOS security devices can belong to more than one cluster if cluster virtualization is enabled.
    • C、If the cluster-id value is set to 0 on a JUNOS security device, the device will not participate in the cluster.
    • D、A reboot is required if the cluster-id or node value is changed.
    • E、JUNOS security devices can belong to one cluster only.

    正确答案:C,D,E

  • 第19题:

    单选题
    In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()
    A

    private VLANs

    B

    port security

    C

    BPDU guard

    D

    dynamic ARP inspection

    E

    DHCP snooping


    正确答案: A
    解析: 暂无解析

  • 第20题:

    多选题
    ARP Proxy主要是通过代理的方式来解决网络互通的问题,ARP Proxy以分为下面几种?()
    A

    路由式ARP Proxy

    B

    VLAN 内ARP Proxy

    C

    二层ARP Proxy

    D

    VLAN 间ARP Proxy


    正确答案: B,D
    解析: 暂无解析

  • 第21题:

    多选题
    Which two statements are true about the relationship between static NAT and proxy ARP? ()(Choose two.)
    A

    It is necessary to forward ARP requests to remote hosts.

    B

    It is necessary when translated traffic belongs to the same subnet as the ingress interface.

    C

    It is not automatic and you must configure it.

    D

    It is enabled by default and you do not need to configure it.


    正确答案: D,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which three statements best describe HSRP configuration on Cisco Nexus switches?()
    A

    In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.

    B

    In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.

    C

    You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.

    D

    You can use the show standby command to verify HSRP operation and configuration.

    E

    If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.


    正确答案: E,C
    解析: 暂无解析

  • 第23题:

    多选题
    Which three statements are true when working with high-availability clusters? (Choose three.)()
    A

    The valid cluster-id range is between 0 and 255.

    B

    Junos OS security devices can belong to more than one cluster if cluster virtualization is enabled.

    C

    If the cluster-id value is set to 0 on a Junos security device, the device will not participate in the cluster.

    D

    A reboot is required if the cluster-id or node value is changed.

    E

    Junos OS security devices can belong to one cluster only.


    正确答案: E,B
    解析: 暂无解析

  • 第24题:

    多选题
    Which two statements are true regarding proxy ARP?()
    A

    Proxy ARP is enabled by default.

    B

    Proxy ARP is not enabled by default.

    C

    JUNOS security devices can forward ARP requests to a remote device when proxy ARP is enabled.

    D

    JUNOS security devices can reply to ARP requests intended for a remote device when proxy ARP is enabled


    正确答案: B,D
    解析: 暂无解析