单选题Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()A It is applied only on the input interface of a router.B It is applied only on the out

题目
单选题
Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()
A

It is applied only on the input interface of a router.

B

It is applied only on the output interface of a router.

C

It can be configured either on the input or output interface of a router.

D

It cannot be configured on a router interface.

E

It is configured under any routing protocol process.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which of the following is the most effective technique to prevent source IPAddress spoofing?()

  • A、 policy based routing (PBR)
  • B、 unicast reverse path forwarding (uRPF)
  • C、 lock and keyACL
  • D、 RFC 1918filtering
  • E、 IP source routing

正确答案:B

第2题:

Which of these statements accurately identifies how Unicast Reverse Path Forwarding can be employed to prevent the use of malformed or forged IP sources addresses?()

  • A、It is applied only on the input interface of a router.
  • B、It is applied only on the output interface of a router.
  • C、It can be configured either on the input or output interface of a router.
  • D、It cannot be configured on a router interface.
  • E、It is configured under any routing protocol process.

正确答案:A

第3题:

Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()

A. ip sa-validate

B. ip split-horizon

C. ip access-routes

D. ip filter-options


参考答案:A

第4题:

By default, which two statements are true about export routing policies?()

  • A、Export policies can evaluate only active routes
  • B、Export policies can evaluate all routes
  • C、Export policies can be applied to the forwarding table
  • D、Export policies can be applied directly to interfaces

正确答案:A,C

第5题:

For a router connected to two ISPs for redundancy, using IPSLA and static routing, how would youconfigure uRPF on the uplink interface?()

  • A、ip verify unicast source reachable-via any
  • B、ip verify unicast reverse-path
  • C、ip verify unicast reverse-path loose
  • D、ip verify unicast reverse-path strict

正确答案:A

第6题:

Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()

  • A、It is used in multihome network scenarios.
  • B、It can be used with BGP to mitigate DoS and DDoS.
  • C、It does not need to have CEF enabled.
  • D、It is enabled via the interface level command ip verify unicast reverse-path.
  • E、It cannot be used with "classification" access lists.

正确答案:A,B

第7题:

What does the mac packet-classify command do when applied to an interface configuration?()

  • A、 It enables MAC ACLs to be applied to only IP packets that enter the interface.
  • B、 It enables MAC ACLs to be applied to only non-IP packets that enter the interface.
  • C、 It enables MAC ACLs to be applied to all packets that enter the interface.
  • D、 It enables MAC ACLs to be used for QoS settings.

正确答案:C

第8题:

By default, which two statements are true about export routing polices?()

A. Export polices can evaluate only active routes

B. Export polices can evaluate all routes

C. Export polices can be applied to the forwarding table

D. Export polices can be applied to interfaces


参考答案:A, C

第9题:

Which configuration command allows the ERX Edge Router to perform Unicast Reverse Path Forwarding lookups on all packets received on an IP interface?()

  • A、ip sa-validate
  • B、ip split-horizon
  • C、ip access-routes
  • D、ip filter-options

正确答案:A

第10题:

Which three statements about IOS Firewall configurations are true?()

  • A、The IP inspection rule can be applied in the inbound direction on the secured interface.
  • B、The IP inspection rule can be applied in the outbound direction on the unsecured interface.
  • C、The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.
  • D、The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
  • E、For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.
  • F、For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.

正确答案:A,B,D

更多相关问题