Chinaunix首页 | 论坛 | 博客
  • 博客访问: 209630
  • 博文数量: 317
  • 博客积分: 2010
  • 博客等级: 大尉
  • 技术积分: 2775
  • 用 户 组: 普通用户
  • 注册时间: 2008-08-30 12:25
文章分类

全部博文(317)

文章存档

2010年(56)

2009年(38)

2008年(223)

我的朋友

分类:

2008-09-22 14:32:50

640-802考试题库更新日期2008-9-3
1. What are two reasons that a network administrator would use access lists? (Choose two.)
A. to control vty access into a router
B. to control broadcast traffic through a router
C. to filter traffic as it passes through a router
D. to filter traffic that originates from the router
E. to replace passwords as a line of defense against security incursions
Answer: AC
2. A default Frame Relay WAN is classified as what type of physical network?
A. point-to-point
B. broadcast multi-access
C. nonbroadcast multi-access
D. nonbroadcast multipointE. broadcast point-to-multipoint
Answer: C
3. A single 802.11g access point has been configured and installed in the center of a square office. A few wirelessusers are experiencing slow performance and drops while most users are operating at peak efficiency. What arethree likely causes of this problem? (Choose three.)
A. mismatched TKIP encryption
B. null SSIDC. cordless phones
D. mismatched SSID
E. metal file cabinets
F. antenna type or direction
Answer: CEF
4. The command frame-relay map ip 10.121.16.8 102 broadcast was entered on the router. Which of the followingstatements is true concerning this command?
A. This command should be executed from the global configuration mode.
B. The IP address 10.121.16.8 is the local router port used to forward data.
C. 102 is the remote DLCI that will receive the information.
D. This command is required for all Frame Relay configurations.
E. The broadcast option allows packets, such as RIP updates, to be forwarded across the PVC.
Answer: E
5. Which type of attack is characterized by a flood of packets that are requesting a TCP connection to a server?
A. denial of service
B. brute force
C. reconnaissance
D. Trojan horse
Answer: A
6. Which of the following are associated with the application layer of the OSI model? (Choose two.)
A. ping
B. Telnet
C. FTP
D. TCP
E. IP
Answer: BC
7. For security reasons, the network administrator needs to prevent pings into the corporate networks from hostsoutside the internetwork. Which protocol should be blocked with access control lists?
A. IP
B. ICMP
C. TCP
D. UDP
Answer: B
阅读(293) | 评论(0) | 转发(0) |
给主人留下些什么吧!~~