Which two of these multicast deployments are most susceptibl

题目
多选题
Which two of these multicast deployments are most susceptible to attacks from unknown sources?()
A

ASM

B

BiDir PIM

C

PIM-SM RP

D

RP-Switchover

E

Source Specific Multicast

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()

A. FWSM routes traffic between the VLANs.

B. FWSM switches traffic between the VLANs.

C. Transparent mode is often called bump-in-the-wire mode.

D. Transparent mode firewall deployments are used most often in current designs.

E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.


参考答案:B, C

第2题:

Which two characteristics are true of a firewall running in routed mode based on the following information?()

A. FWSM routes traffic between the VLANs.

B. FWSM switches traffic between the VLANs.

C. Routed mode is often called bump-in-the-wire mode.

D. Routed mode firewall deployments are used most often in current designs.


参考答案:A, D

第3题:

Which two multicast groups support Auto-RP mapping and discovery?()

A.224.0.0.39

B.224.0.1.39

C.224.0.0.40

D.224.0.1.40


参考答案:B, D

第4题:

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

  • A、 ASM
  • B、 BiDir PIM
  • C、 PIM-SM RP
  • D、 RP-Switchover
  • E、 Source Specific Multicast

正确答案:A,B

第5题:

As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design program. Which two of the following descriptions correctly identify its features? ()(Choose two.)

  • A、It strives to protect access to design documentation.
  • B、It facilitates customer deployments that are more predictable.
  • C、It facilitates customer deployments that are less reliable.
  • D、It incorporates products and technologies into a broad portfolio.

正确答案:B,D

第6题:

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A.ASM

B.BiDirPIM

C.PIM-SMRP

D.RP-Switchover

E.SourceSpecificMulticast


参考答案:A, B

第7题:

Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

  • A、ASM
  • B、BiDirPIM
  • C、PIM-SMRP
  • D、RP-Switchover
  • E、SourceSpecificMulticast

正确答案:A,B

第8题:

Which two multicast IP addresses can be represented by the multicast MAC addre ss 0100.5e0A.0A07?()

A. 228.10.10.7

B. 229.11.10.7

C. 229.138.10.7

D. 229.138.10.8

E. 228.10.10.8

F. 228.10.138.7


参考答案:A, C

第9题:

Which two of the following Cisco router platforms support Multicast Distributed Fast Switching?()

  • A、3600 series
  • B、7200 series with NSE-1
  • C、7500 series
  • D、12000 series

正确答案:C,D

第10题:

Which two are characteristics of an IPv6 multicast address?()

  • A、First (most significant ) octet is FF in hex
  • B、Starts with a prefix of FE80 to FEBF in hex
  • C、Starts with a prefix of FECO to FEFF in hex
  • D、Second octet contains a 4-bit multicast scope field
  • E、Last 64 bit contains the modified MAC address of the Ethernet interface
  • F、Is allocated from the unicast address space

正确答案:A,D

更多相关问题