单选题Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()A close-connectionB terminate-connectionC close-client-and-serverD terminate-session

题目
单选题
Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()
A

close-connection

B

terminate-connection

C

close-client-and-server

D

terminate-session

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which action does the ping 172.18.1.1 size 5 command perform?()

A. It sends only five ping requests to the 172.18.1.1 destination.

B. It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.

C. It sends five rapid ping requests to the 172.18.1.1 destination.

D. It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.


参考答案:B

第2题:

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a (请作答此空) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were ( ) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

A.browser-server
B.user- server
C.client-server
D.business -customer

答案:C
解析:
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in active or passive mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

第3题:

To control the execution of a server process when it is receiving bad packets from a potentially malicious client, you set the SEC_PROTOCOL_ERROR_FURTHER_ACTION initialization parameter as follows:SQL> ALTER SYSTEM SET SEC_PROTOCOL_ERROR_FURTHER_ACTION = Drop,10;What is the significance of this setting?()

A. It terminates the client connection after 10 bad packets and the client cannot reconnect to the same instance.

B. It terminates the client connection after 10 bad packets but the client can still reconnect, and attempt the same operation again.

C. It terminates the client connection 10 seconds after receiving a bad packet and the client cannot reconnect to the same instance.

D. It terminates the client connection after receiving a bad packet and the client can reconnect to the same instance after 10 minutes.


参考答案:B

第4题:

Which statement regarding the implementation of an IDP policy template is true?()

  • A、IDP policy templates are automatically installed as the active IDP policy.
  • B、IDP policy templates are enabled using a commit script.
  • C、IDP policy templates can be downloaded without an IDP license.
  • D、IDP policy templates are included in the factory-default configuration.

正确答案:B

第5题:

Which action does the ping 172.18.1.1 size 5 command perform?()

  • A、It sends only five ping requests to the 172.18.1.1 destination.
  • B、It sends a continuous ping with a packet length of five bytes to the 172.18.1.1 destination.
  • C、It sends five rapid ping requests to the 172.18.1.1 destination.
  • D、It sends a continuous rapid ping with a packet length of five bytes to the 172.18.1.1 destination.

正确答案:B

第6题:

A user reports being occasionally disconnected from the server. Which of the following tools couldthe technician use to determine if it is the client or the server that is dropping the connection?()

A. Packet sniffer

B. Multimeter

C. Load balancer

D. Throughput tester


参考答案:A

第7题:

The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer ( ) between a client and server on a computer network.FTP is built on a ( ) model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a ( ) sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were (请作答此空) programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in ( ) mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

A.command-line
B.graphical
C.automation
D.productivity

答案:A
解析:
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files between a client and server on a computer network.FTP is built on a client-server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).The first FTP client applications were command-line programs developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Many FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML editors.FTP may run in active or passive mode, which determines how the data connection is established. In both cases, the client creates a TCP control connection from a random, usually an unprivileged, port N to the FTP server command port 21.In active mode, the client starts listening for incoming data connections from the server on port M. It sends the FTP command PORT M to inform the server on which port it is listening. The server then initiates a data channel to the client from its port 20, the FTP server data port.In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server, which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive mode at that time, updating it to extended passive mode.

第8题:

Which IDP policy action closes the connection and sends an RST packet to both the client and the server?()

A. close-connection

B. terminate-connection

C. close-client-and-server

D. terminate-session


参考答案:C

第9题:

A router receives an IPv6 packet which is 2000 bytes in length. The MTU of the outgoing interface is 1500 bytes. What action will the router take?()

  • A、forwards the packet
  • B、fragments the packet
  • C、drops the packet silently
  • D、drops the packet and sends an ICMP message

正确答案:D

第10题:

Which of the following are not steps in setting up aTLS session? ()

  • A、 Client sends Hello to Server listing all of its supported cipher suites
  • B、 Server sends Hello to Client listing all of its supported cipher suites
  • C、 Client calculates and sends encryptedpre_master_secret
  • D、 Client and Server calculate keys from pre_master_secret
  • E、 Server sends Change Cipher Spec to indicate a shift to encrypted mode

正确答案:B

更多相关问题