|
发表于 2012-2-13 11:01:43
|
显示全部楼层
Question 443- Z8 M" _- T! g% Q& k9 z% ^6 ~8 q! t
; ?2 }, E/ x* C- i- w' D$ ]4 V
Which two statements apply to dynamic access lists? (choose two)
% ?+ T1 P$ F0 N/ T; C
' u5 c3 [/ j- DA. they offer simpler management in large internetworks.( `9 _4 t% l* L: v% `( X
B. you can control logging messages.
# O G) W7 [2 C. Y/ Q0 zC. they allow packets to be filtered based on upper-layer session information.* j* o+ B4 }, X6 O+ Y
D. you can set a time-based security policy.
$ D0 r# R; d L( z8 b4 ^, D" BE. they provide a level of security against spoofing. h' A+ D8 M! { }7 H! ~
F. they are used to authenticate individual users.
2 x7 s3 Q7 H: Y' Q! H E9 G! g; h2 W4 t
$ \, u& B* V" n" M. \1 e' T
6 _3 z3 j! p; wAnswer: A F# o Z; ~; Q% |- b$ v3 v) v
# Q8 i) [8 L" _ n
Explanation
8 H2 o2 @+ z1 T# A" D9 C' f4 J3 C5 [+ S( f- L3 G" g" e
Dynamic ACLs have the following security benefits over standard and static extended ACLs:" [* e+ r! b' A2 s6 M* V
+ Use of a challenge mechanism to authenticate individual users- N9 w8 ~5 C8 i3 j1 N% d. a
+ Simplified management in large internetworks0 s' }" p$ N& n- G+ g
+ In many cases, reduction of the amount of router processing that is required for ACLs
) j) W5 n3 }' ?# ]8 k5 }+ Reduction of the opportunity for network break-ins by network hackers9 ]7 A3 K4 ^1 L' c' m
+ Creation of dynamic user access through a firewall, without compromising other configured security restrictions# K7 d, ?; E- i$ `- q) I% l
& G7 I6 `/ M& W; i7 |8 e8 k(Reference: CCNA Exploration 4 – Dynamic ACLs)
6 ^; V3 _" [- S
8 R: z4 d( M" e) |http://www.9tut.com/ccna-%E2%80%93-access-list-questions-2 |
134#
2012-2-13 11:01:43
回复(0)
收起回复
|