|
发表于 2012-2-13 11:01:43
|
显示全部楼层
Question 443
* V0 |. Y1 P+ @. i8 A% b7 Q! L4 \1 i4 G9 \( @
Which two statements apply to dynamic access lists? (choose two)( f* {- _- L2 y9 F6 [5 D J5 P
3 Y! o7 z! Y2 o- ]5 L1 E/ c' l$ \
A. they offer simpler management in large internetworks.
. P) O* ^2 e3 g5 nB. you can control logging messages.
. O5 K9 `7 h* ]$ q* I* rC. they allow packets to be filtered based on upper-layer session information.- Z9 K2 [( K& G0 u+ p7 X
D. you can set a time-based security policy.
* P# _; b+ B* N- I+ o: WE. they provide a level of security against spoofing.
1 M, O# U$ U% j6 u: wF. they are used to authenticate individual users.
8 _9 W. R, r( K4 ?
. L0 v/ p' s5 h( n; I/ k( d& A2 R
. _3 a4 f. N0 `9 M6 D# I7 [$ p$ t" N) ^& a* ?& F$ M
Answer: A F
# f. ?4 R9 }/ O' I' x' P9 P4 o" S0 G* y$ d% l# t4 [6 v( M7 T6 Q
Explanation: t! t7 f5 r3 ~6 Y1 W; @" A
h9 g- S* Q0 A) U5 h. K* t5 M
Dynamic ACLs have the following security benefits over standard and static extended ACLs:
5 K4 `. q" z4 X1 |3 r. q+ Use of a challenge mechanism to authenticate individual users
8 X8 q1 E! A6 G" R+ Simplified management in large internetworks
- j% R) K, Y6 z) Q; ]+ In many cases, reduction of the amount of router processing that is required for ACLs' q* W& N2 r1 Q& |' e
+ Reduction of the opportunity for network break-ins by network hackers
/ I3 i4 }: R* j# Q: t1 h$ d1 r+ Creation of dynamic user access through a firewall, without compromising other configured security restrictions
, o+ L' S0 i% R# o( _. }. n8 O7 H6 H) P! e: x. `: v) p. G4 w
(Reference: CCNA Exploration 4 – Dynamic ACLs)
! z5 U, C, D B
7 M8 S l8 F8 Y1 F: D+ k/ phttp://www.9tut.com/ccna-%E2%80%93-access-list-questions-2 |
|