How to see the number of matches the ACL()
A. display current-configuration
B. display ACL all
C. display startup saved-configuration
D. display device
As illustrated connection : PC1 ----- SW1 ------------ SW2 ----- PC2; SW1 two ports defined for VLAN1 access type port,SW2 two ports defined as VLAN 2 access port type,(PC1 and PC2 in the same subnet) then the following description is correct?
A. Because all access port,in fact, do not pass VLAN tag information, so you can access PC1 PC2.
B. Because VLAN SW2 SW1 and the ends are different, so youcannotcommunicate between two PC.
C. If two switches are connected to the port is set to trunk ports, two PC can communicate.
D. Because PVID default port on the switch is VLAN 1, so the PC can be both visits.
After receiving the L2TP LNS packets,check if the newspaper wengong IP address is not found in the local header successfully established the link, but also to the next step L2TP packet of information processing.
A. True
B. False
LAC is to achieve the established L2TP VPN tunnel by what means?(Choose two)
A. User Account
B. Domain name
C. ACL
D. Routing Table
Middle attack both passive and active attacks characteristic attack
A. True
B. False
Address-group{number | name} meaning no-pat in no-pat parameter is?
A. Do address translation
B. The port multiplexing
C. Not convert the source port
D. Not convert the destination port
After the write function is enabled USB encryption policies,end-user copy to U disk files are encrypted, only the enterprise user and installed TSM terminal security agents in order to use these encrypted files,encrypted files copied from disk to the local U hardware automatically decrypted;
A. True
B. False
In network security,interruption means an attacker to compromise a network system resources,making it become invalid or useless.This is() attack?
A. Availability
B. Confidentiality
C. Integrity
D. Truth
TSM system which consists of the following regions?(Choose three)
A. Pre-authentication domain
B. After authentication domain
C. Isolated domain
D. TSM domain
Tunnel interface (Tunnel Interface)is a virtual interface to achieve multipoint type of packet encapsulation provided.
A. True
B. False