Which of the following features is essential in a firewall if it is to support RTP sessions?()A、Remote consoleB、StatefulnessC、Address translationD、Zones

题目

Which of the following features is essential in a firewall if it is to support RTP sessions?()

  • A、Remote console
  • B、Statefulness
  • C、Address translation
  • D、Zones

相似考题
更多“Which of the following features is essential in a firewall if it is to support RTP sessions?()A、Remote consoleB、StatefulnessC、Address translationD、Zones”相关问题
  • 第1题:

    A support technician wants to help a user, in a different city, navigate a new software program. Which of the following will allow the user and technician to view and control the Windows XP PC desktop simultaneously?()

    • A、Terminal Services
    • B、Remote Assistance
    • C、Routing and Remote Access Service
    • D、Remote Desktop

    正确答案:B

  • 第2题:

    Which of the following features would hide internal IP addresses from the Internet?()

    • A、Network Address Translation
    • B、Port forwarding
    • C、Quality of Service
    • D、SSID broadcast

    正确答案:A

  • 第3题:

    Which of the following features on a wireless router maps the private IP address to a public IPaddress?()

    • A、SSID
    • B、NAT
    • C、MAC filtering
    • D、DHCP

    正确答案:B

  • 第4题:

    Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()

    • A、The firewall settings
    • B、The DHCP address
    • C、The workgroup name
    • D、The SSID

    正确答案:D

  • 第5题:

    Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()

    • A、21
    • B、443
    • C、3389
    • D、8080

    正确答案:C

  • 第6题:

    Which of the following are included with the built-in features of the IBM XIV Storage System?()

    • A、snapshots, deduplication, volume mirroring 
    • B、deduplication, thin provisioning, snapshots 
    • C、snapshots, remote mirroring, thin provisioning 
    • D、remote mirroring, thin provisioning, deduplication

    正确答案:C

  • 第7题:

    Which three JUNOS software features allow for increased security on your network?()

    • A、firewall filters
    • B、data encryption
    • C、routing protocol authentication
    • D、support for BGP path mtu discovery
    • E、automatic discovery for IPSEC neighbors

    正确答案:A,B,C

  • 第8题:

    Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)

    • A、rate limiting of ICMP
    • B、RADIUS authorizations
    • C、source address validation
    • D、stateful firewall on the router

    正确答案:A,C

  • 第9题:

    You are designing a Windows 7 virtual desktop infrastructure.You have the following requirements:   Provide access to Remote Desktop Services RemoteApp sources from multiple remote desktop servers.  Support network load balancing.  Support reconnection to existing sessions on virtual desktops.    You need to specify a design that meets the requirements.   What should you include in your design?()

    • A、Remote Desktop Gateway
    • B、Remote Desktop Connection Broker
    • C、Windows Deployment Services
    • D、Windows Virtual PC and Windows XP Mode

    正确答案:B

  • 第10题:

    单选题
    Which of the following ports MUST be open on the firewall to allow remote desktop connection and remote assistance traffic through?()
    A

    21

    B

    443

    C

    3389

    D

    8080


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()
    A

    23

    B

    443

    C

    8080

    D

    3389


    正确答案: A
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following features is essential in a firewall if it is to support RTP sessions?()
    A

    Remote console

    B

    Statefulness

    C

    Address translation

    D

    Zones


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()

    • A、 FHRP to remote branches.
    • B、 Layer 3 MPLS VPNs routing.
    • C、 Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
    • D、 Intrusion prevention, QoS, and stateful firewall support network wide.

    正确答案:B

  • 第14题:

    Which two statements are true regarding firewall user authentication?() (Choose two.)

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
    • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
    • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

    正确答案:B,C

  • 第15题:

    Which of the following features is only available with the Windows XP Professional version as compared to the Windows XP Home version?()

    • A、Simple File Sharing
    • B、Basic Disk Partitions
    • C、Remote Desktop
    • D、Joining a domain

    正确答案:D

  • 第16题:

    A small office in which all workstations are using an ISP provided IP range has noticed a consistent decrease in network traffic speed. The decrease does not occur when the gateway to the ISP is disconnected. Which of the following should the administrator implement?()

    • A、Multicast addressing
    • B、Load balancing
    • C、Address translation
    • D、DHCP

    正确答案:C

  • 第17题:

    A technician cannot connect using Remote Desktop. Which of the following ports needs to be allowed in the firewall? ()

    • A、23
    • B、443
    • C、8080
    • D、3389

    正确答案:D

  • 第18题:

    What are features and benefits of Remote Support Manager?() 1.Built in firewall  2.Runs on Linux and Windows servers 3.Collect support data  4.Allow remote maintenance  5.Can support up to 50 DS5000/DS4000/DS3000 storage servers  6.Minimum annual fee

    • A、1,2 and 5
    • B、1,5 and 6
    • C、2,3 and 6
    • D、1,4 and 5

    正确答案:D

  • 第19题:

    Which two statements are true regarding firewall user authentication?()

    • A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.
    • C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.
    • D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

    正确答案:B,C

  • 第20题:

    Which of the following features enables you to modify the addresses of senders and recipients on messages that Exchange 2010 organization?()

    • A、Transport rule
    • B、Journaling
    • C、Address rewriting
    • D、Sender filtering

    正确答案:C

  • 第21题:

    单选题
    Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()
    A

     FHRP to remote branches.

    B

     Layer 3 MPLS VPNs routing.

    C

     Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.

    D

     Intrusion prevention, QoS, and stateful firewall support network wide.


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    Which two statements are true regarding firewall user authentication?()
    A

    When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    B

    When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.

    C

    If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.

    D

    If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.


    正确答案: B,C
    解析: 暂无解析

  • 第23题:

    单选题
    Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()
    A

    The firewall settings

    B

    The DHCP address

    C

    The workgroup name

    D

    The SSID


    正确答案: D
    解析: 暂无解析