- 积分
- 83
- 鸿鹄币
- 个
- 好评度
- 点
- 精华
- 最后登录
- 1970-1-1
- 阅读权限
- 20
- 听众
- 收听
助理工程师
 
|
+ O. Y2 i8 S" _
! [, u( t; O0 B2 K/ L2 e
9 H2 J0 E8 w2 _2 t1 c# g
# o& ^# n% s, ~) s; O( M( K7 {) S
下面是我记得的新题(5.3)。
# P' \' R+ K2 c% I( ]=================================4 E4 Q& H4 p" i' k- Q
drag and drop
/ y! m1 g# \4 ~! g1. MAN service% z. E3 @8 d" ]) k) J* P; a
2. limited by physical location; U4 b& p& V7 h( a" L
3. fully mesh: J* H1 \* M' U3 @" C
4. cost efficient
9 Y& a; X& h! i# ?6 I' ~6 N5. hub and spoke
% o3 }; o, v& c7 W2 \8 [6. 还有一个记不清了
: `0 o; T2 y7 G9 G
$ Z, |: [( N0 t& g/ Pdrop zone (每项有2个drop)
' a4 V2 J* H5 [* `8 Y0 U- K1. Mettro Ethernet
( m* f) Y6 G- N2 `2. point-multiplepoint* p3 ^/ L( W$ o3 y2 V4 K- E$ j
3. multipoint-multipoint
2 R* W7 O; ^, V1 o# h$ y9 Y% b9 c8 [, A9 B( y3 h
0 w8 t" n# O2 h5 _
=================! U* X" j% k- I# g
as exhibit, the output of show isis database
; ]/ I, _: P* wquestion 好像是 哪个router for unknown from the area. 有 R1 到 R6 的选择, K3 r) ~ @8 ^, W, E$ l
/ L9 u, g1 _2 a! D
& Y. ?1 w& s- l+ S) G* V==================
8 I0 ~( F* ?2 p) S3 e' Q8 h* Z# kwhich feature requires def-hellmen key exchange everytime data transmitted in the ipsec tunnel?
- h( c' L8 B: w, Z' _ B: Q6 v# B1. 801.x authentication$ r: R- O9 b. M( @! o% f# q- L; `
2. rsa-... authentication7 w/ z; s2 H' S% V8 Z
3. rsa-encr authentication7 w1 [0 ^% ?2 ^ I
4. 还有一个记不清了8 c$ P8 @$ r& b. p" p" z2 j
5. PFS
' V5 F( P; `* }
" _4 ?" c0 z, ]. b; M' P6 u
1 A5 R/ |( m% z a% p==================
% [' W2 Y; N$ e9 F$ ^as exhibit, one server is connected to R1, R1 is connected to 2 ISPs (from 2 different routers R2, R3). one client is connected to R2 (ip:192.168.2.1/24). one attacker is connected to R3 (ip:192.168.2.1/24). what security feature on R1 can prevent the attacker?
# [3 O9 F: d. e1. ip source guard
, c0 f( B8 G, k6 y& g! [, `7 T6 K2. uRPF loose mode# s8 t! Z6 q1 O
3. uRPF strict node
9 p$ \) \& U _5 }% T4. 还有一个记不清了( {" i; {2 J6 g0 O
# l s+ O1 h; O1 y2 N
|
评分
-
查看全部评分
|