本帖最后由 小乔 于 2017-7-17 09:02 编辑 2 x5 C3 l2 R* W* G8 T
, i9 P, Z" R; ^! F
0 V2 Q2 e4 @! ^: A2 ]% M/ x+ u% ?! D3 k
+ a- `& W( `2 T; U
, ~ k- X8 r5 \# C7 G' C E3 ?$ I3 S
新题9 Y! U. S1 C9 S- Q& `4 e
What is the purpose of theBGP TTL security check? To protect against CPUutilization-based attacks
# p2 g& F: |$ @
What are three features thatare enabled by generating Change of Authorization (CoA) requests in a pushmodel? (three) Session identification Host reauthentication
) G) E& I& K( d1 E0 s! VSession termination. 3 ?1 A" M4 _) g3 G+ \2 l; c
Under Cisco IOS Software,which two features are supported in RADIUS Change of Authorization requests?(two) Session reauthentication / {6 y }4 ?# @5 q! K' ^
Session termination
0 p B6 @+ u& I4 ?* c
What is an example of astream cipher? 8 |/ t. j. b& s- x3 g7 N1 A
RC4
T3 R, c# N/ R7 |3 g# s+ m
Which three statements aboutthe keying methods used by MACSec are true? ( three) ASP is not supported onswitch SVIs. MKA is mplemented as anEAPoL packet exchange.
4 _9 q9 U3 z/ r) }A valid mode for SAP isNULL.
5 R Z: a q0 ]8 }
Which two statements aboutCisco ASA authentication using LDAP re true? (two) It use attribute maps to mapthe AD member of attribute to the Cisco ASA Group-Policy attribute.
3 q7 J- Z/ c: ^" I% M6 T- ?0 i6 k9 wIt uses AD attribute maps toassign users to group policies configured under the WebVPn context. " v8 _, k5 n4 l1 V4 N
|