题目

A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()

A、 NIC filtering is enabled.

B、 Port security is configured.

C、 NIC is not in promiscuous mode.

D、 NIC is in promiscuous mode.

提示:未搜索到的试题可在搜索页快速提交,您可在会员中心"提交的题"快速查看答案。
答案
查看答案
相关试题

Which three settings are accessible from the serial console menu on a MAG Series device?()

A

The ping command

B

Factory default reset

C

Personality image

D

License imports

E

Admin login credentials

()可以看成是星形拓扑结构的扩展。

A、网形网

B、星形网

C、树形网

D、环形网

You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

A、Your RADIUS server database must be replicated onto another device for redundancy.

B、Inner proxy creates a tunnel between the supplicant and the external server.

C、RADIUS proxy causes the role assignment process to be skipped.

D、Outer proxy configuration passes authentication data to the external RADIUS server in clear text.

Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()

A

B

*

C

ANY

D

MARKETING

Which security mechanism uses the concept of a realm?()

A、Authorization

B、Data integrity

C、Confidentiality

D、Authentication

联系我们 会员中心
返回顶部