|
发表于 2012-2-13 11:01:43
|
显示全部楼层
Question 4435 P2 z1 t3 r% O, M9 |9 y
0 ?/ z$ n" i3 F/ s9 |Which two statements apply to dynamic access lists? (choose two)
' B+ C& I' k+ Y& a6 Z# h6 ~8 j0 V) v( c3 f. `
A. they offer simpler management in large internetworks., t7 z; z7 p/ {
B. you can control logging messages.
7 O: ?0 _' }5 UC. they allow packets to be filtered based on upper-layer session information.
, N8 w3 c# p% @' ^& CD. you can set a time-based security policy.
% m4 R1 E6 [3 o: v6 FE. they provide a level of security against spoofing.& W5 I0 q& _8 U8 X3 ?2 }$ l
F. they are used to authenticate individual users.: E: y+ m8 U1 \' g! I( [5 y N
: e {4 h- }$ I; K% t1 S( ]( \$ G+ o
% Y! _9 _3 y% b8 u; k% ~( A* \
$ H( [# [/ U; f9 P7 G. u Y" Y
Answer: A F
: V3 f; z# R- l' H: j, V- v. i9 N$ V Y+ b. }/ s5 _: j
Explanation
' a$ `% w7 c) [" E
$ E1 n) p+ `, E x' kDynamic ACLs have the following security benefits over standard and static extended ACLs: l$ G" e- D0 T& U
+ Use of a challenge mechanism to authenticate individual users
- W5 o: n+ z1 [9 ~' S4 D+ Simplified management in large internetworks
% K/ ?, w/ B- ]0 J+ In many cases, reduction of the amount of router processing that is required for ACLs
- D1 c6 a; E# a; @$ Z$ Q+ Reduction of the opportunity for network break-ins by network hackers3 V1 P7 [+ i" M5 ^2 J
+ Creation of dynamic user access through a firewall, without compromising other configured security restrictions
$ F. J# \0 ^# q9 v' ?1 u8 u D8 C: a V
(Reference: CCNA Exploration 4 – Dynamic ACLs)
1 J0 n8 L3 O3 R* _; y
. J2 l. j/ L& } C( A1 M& E* ohttp://www.9tut.com/ccna-%E2%80%93-access-list-questions-2 |
134#
2012-2-13 11:01:43
回复(0)
收起回复
|