本帖最后由 小乔 于 2017-7-17 09:02 编辑
, o' X/ @& {* r, {$ K0 t H2 `$ A# r9 p& C0 ]9 P
* O( t; ?7 l! y/ h
" r+ g, D+ y( u4 H; H) _5 D
' Y* N! e7 g; {8 K" V V
2 b6 q W$ q5 o) x! k7 n( \* \
) V% Q* Z1 |8 [; X8 C+ {7 Q9 X新题1 W" ~. G! A* a8 ^
What is the purpose of theBGP TTL security check? To protect against CPUutilization-based attacks 1 z0 k( E0 N, V; N4 c
What are three features thatare enabled by generating Change of Authorization (CoA) requests in a pushmodel? (three) Session identification Host reauthentication
. u* s& ?+ X: ]! B8 BSession termination.
+ a& h! S; y/ a) x% f) m
Under Cisco IOS Software,which two features are supported in RADIUS Change of Authorization requests?(two) Session reauthentication
5 ~2 F1 {' P; k+ y* D- o& oSession termination $ s! u7 F8 ?4 a( D
What is an example of astream cipher? # T& D9 {& W) ^4 q8 T
RC4 " o K& v, Z* C
Which three statements aboutthe keying methods used by MACSec are true? ( three) ASP is not supported onswitch SVIs. MKA is mplemented as anEAPoL packet exchange. ( C* f" ^/ ^% z5 x; Z
A valid mode for SAP isNULL. " N8 k3 p. H7 U! O( J7 C
Which two statements aboutCisco ASA authentication using LDAP re true? (two) It use attribute maps to mapthe AD member of attribute to the Cisco ASA Group-Policy attribute.
9 ]6 `( R+ {% I8 ]! T& [4 mIt uses AD attribute maps toassign users to group policies configured under the WebVPn context. 2 A0 n7 P) z2 Q: b9 ]
|