|
发表于 2012-2-13 11:01:43
|
显示全部楼层
Question 443
: k7 ?7 p! X) ~- A1 I% _
& S2 \* j/ Y6 HWhich two statements apply to dynamic access lists? (choose two)4 {) f- N6 z+ _6 l! |
7 u, }: o0 _* m: }2 aA. they offer simpler management in large internetworks.
' D" {: j- A3 nB. you can control logging messages.# h0 k# U9 `3 ^6 p
C. they allow packets to be filtered based on upper-layer session information.
! u% L+ b/ G/ w8 o3 c ?& o; MD. you can set a time-based security policy.
& t/ `5 X! k* JE. they provide a level of security against spoofing.
, ?: A% \% I3 s5 _F. they are used to authenticate individual users.& L% w( i* A% ~; c
+ K- o6 @3 F! v8 ^- g$ ^ O0 [
j/ y# N( h5 h& C9 i& A) Z3 V! D
Answer: A F( s) d! L0 t- [! V r& C
4 B# p: i: Q$ u9 B& v0 Y& h" \3 z
Explanation
; f0 y, _! V% T5 U# v8 P8 Q
! F& K C: n, H3 ]7 \Dynamic ACLs have the following security benefits over standard and static extended ACLs:5 m) \3 b" e2 t9 j1 w- x
+ Use of a challenge mechanism to authenticate individual users; v' j+ m7 p' ?' X( t( g4 Z
+ Simplified management in large internetworks9 V+ q4 O/ I3 u
+ In many cases, reduction of the amount of router processing that is required for ACLs: F0 p) H$ x- v5 Y
+ Reduction of the opportunity for network break-ins by network hackers$ }0 I1 s% }. n6 @ }- T5 F
+ Creation of dynamic user access through a firewall, without compromising other configured security restrictions8 ~9 w% c( n1 v9 d% I) @# I8 t
2 }2 n K4 P& Z9 A% G
(Reference: CCNA Exploration 4 – Dynamic ACLs) k b# R& ~3 p9 u' p
& n' k$ n! x- q1 t. N
http://www.9tut.com/ccna-%E2%80%93-access-list-questions-2 |
134#
2012-2-13 11:01:43
回复(0)
收起回复
|