|
发表于 2012-2-13 11:01:43
|
显示全部楼层
Question 443
5 \4 O& r6 D' U1 Q; a8 ~: M2 [
* O, q2 F. j/ e# gWhich two statements apply to dynamic access lists? (choose two)% q% o9 J* Q' V: p& a
" l2 H$ X: K( V) c4 J* ^$ D' BA. they offer simpler management in large internetworks.% t- f0 d" X( ]
B. you can control logging messages.
4 j8 d4 {9 P& l/ y7 H/ v$ YC. they allow packets to be filtered based on upper-layer session information.( Z8 P r: |' \0 B, T+ F2 |; r
D. you can set a time-based security policy.+ {" B% j+ u% M1 p- J) c) g( S" {
E. they provide a level of security against spoofing.
, D8 h% d$ {" P7 x0 G0 SF. they are used to authenticate individual users.- y# m L" Q8 \ T0 V. H
5 L( h- y# `6 x- v
# N6 d5 h; l! X0 y0 _- H' m! \. R5 z# P4 h5 }# B, g3 g) e
Answer: A F
: ?# H( U. J- |" b) y; `! p
% b& i% Y8 j# ?. v: WExplanation+ ^7 H S4 z% v7 X* u; y9 E/ t9 M
( f4 p ~2 p1 t. _9 l: xDynamic ACLs have the following security benefits over standard and static extended ACLs:3 P# ?1 R6 [. {7 b
+ Use of a challenge mechanism to authenticate individual users
+ e1 |, ^* o1 }, K. w% x8 O+ Simplified management in large internetworks
- C: v @# Q' U2 `# Q i7 }+ In many cases, reduction of the amount of router processing that is required for ACLs
/ C4 u7 }& s4 o! z8 \& B5 U% X8 s+ Reduction of the opportunity for network break-ins by network hackers# R- l5 q+ p/ X# P$ f4 }( t
+ Creation of dynamic user access through a firewall, without compromising other configured security restrictions
. a! w1 }" t/ W' I. c/ P2 b& a& B/ m7 X, h# z
(Reference: CCNA Exploration 4 – Dynamic ACLs)
/ a& x% Q# \; R+ r. n: Q$ n+ D
/ l/ w: V0 B4 j$ Ahttp://www.9tut.com/ccna-%E2%80%93-access-list-questions-2 |
134#
2012-2-13 11:01:43
回复(0)
收起回复
|