As shown in the figure, the configurations of the two security gateways are:
RTA
[RTA] ike peer 123
[RTA-ike-peer-123] pre-shared-ke simple 123
[RTA-ike-peer-123] remote-address 10.2.1.2
[RTA-ike-peer-123] local-address 10.2.1.1
[RTA-ike-peer- 123] quit
[RTA] ipsec proposal 1
[RTA -ipsec-proposal-1] quit
[RTA]acl number 3000
[RTA-acl-adv-3000] rule 0 permit ip source 10.1.1.0 0.0.0.255 destination 10.3.1.0 0.0.0.255
[RTA]ipsec polic 1 1 isakmp
[RTA-ipsec-polic-isakmp-1-1] securit acl 3000
[RTA-ipsec-polic-isakmp-1-1] ike-peer 123
[RTA-ipsec-polic-isakmp-1-1] proposal 1
[RTA-ipsec-polic-isakmp-1-1] quit
[RTA] interface Serial0/2/1
[RTA-Serial0/2/1] ip address 10.2.1.1 255.255.255.0
[RTA-Serial0/2/1] ipsec polic 1
[RTA] interface Ethernet 0/1/0
[RTA-Serial0/2/1] ip address 10.1.1.2 255.255.255.0
RTB:
[RTB] ike peer 123
[RTB-ike-peer-123] pre-shared-ke simple 123
[RTB-ike-peer-123] remote-address 10.2.1.1
[RTB-ike-peer-123] local-address 10.2.1.2
[RTB-ike-peer-123]quit
[RTB] ipsec proposal 1
[RTB-ipsec-proposal-1] quit
[RTB]acl number 3000
[RTB-acl-adv-3000] rule 0 permit ip source 10.1.1.0 0.0.0.255 destination 10.3.1.0.0.0.0.255
[RTB]ipsec polic 1 1 isakmp
[RTB-ipsec-polic-isakmp-1-1] securit acl 3000
[RTB-ipsec-polic-isakmp-1-1] ike-peer 123
[RTB-ipsec-polic-isakmp-1-1] proposal 1
[RTB -ipsec-polic-isakmp-1-1] quit
RTB] interface Serial0/2/1
[RTB-Serial0/2/1] ip address 10.2.1.2 255.255.255.0
[RTB-Serial0/2/1]]ipsec polic 1
[RTA] interface Ethernet 0/1/0
[RTA-Serial0/2/1] ip address 10.1.3.1 255.255.255.0
This shows that ______ .
A. Only there from RTB to RTA launched the SA negotiation can succeed
B. Only there from the RTA to RTB launch of SA negotiation can succeed
C. either any party initiated SA negotiation can be successful
D. any any party initiated SA negotiation can not succeed
正解:D
質問 2:
What is correct about DOS attacks is ____ .
A. on to DOS attacks can be controlled by configure access lists on a network device to defense
B. DOS attacks are aimed at reducing the ability of the attacked system to provide services
C. on to DOS attacks in the TCP FLOOD attack, you can use TCP proxy mechanism to defense
D. for at DOS attack in the FTP FLOOD attack can be taken to limit the number of connections per second to defense
正解:B,C,D
質問 3:
Which statement about RED ( Random Early Detection ) is correct?
A. In discarded after a congested port
B. flat average queue length is greater than the maximum discard threshold, packets are dropped randomly
C. flat average queue length is less than the minimum discard threshold, discarding packets not
D. The higher the priority of the packet , the lower the drop probability.Which means less discarded
E. flat average queue length is less than the minimum discard threshold, less than the maximum discard threshold, packets are dropped randomly
正解:C,E
質問 4:
Which of the following descriptions of the traditional telephone system is correct is ____ .
A. electrical telephones and facsimile machines belong to the FXS ordinary telephone devices can be connected to a central office switch via an ordinary telephone line FXO interface.
B. electrically telephone subscriber loop connected by the PBX or central office switches, are connected to the telephone subscriber loop and the PBX a line between the pair, including tip and Ring , wherein Tip ground, Ring then PBX negative electrode.
C. electrically telephone ringing tone by the remote PBX providing a voltage or central office switches completed, the dial tone is provided by the telephone set voltage accomplished.
正解:B
質問 5:
The following information about H.323 describes terminal of the error is ____ .
A. even connected to the PSTN telephone network fax machine is a standard H.323 terminal equipment
B. P through PSTN telephone is a standard H.323 terminal
C. & Poor pass H.323 terminal may not support fax functionality
D. P pass H.323 terminals may not support the video feature
正解:A,B
質問 6:
When the user uses the phone, after picking up the phone handle and inputting the called number, which of the following signaling does the ringing of the called phone belong to ______ .
A. Call call signaling
B. letter information signaling
C. monitoring tube signaling
D. to address signaling
正解:C
質問 7:
The following description of QoS jitter is correct.
A. do force to avoid network congestion
B. QoS can create broadband and make the use of broadband more reasonable
C. branch support network of real-time business
D. transfer control IP network traffic
正解:A,C,D
質問 8:
If the user configures the packet filtering strategy incorrectly and filters all TCP packets, what happens to the call in the H.323 network ?
A. that a call will be discontinued in H.245 stage
B. that a call will be discontinued in Q .Stage 931
C. Does not affect calls between terminals
D. that a call will be discontinued in RAS stage
正解:B
質問 9:
How will the packets belonging to the same FEC be processed in the MPLS network ?
A. in LSR on the same label forwarding entry to forward
B. a packet passes LSR perform independent processing apparatus, the packet destination is IP address is different from the forwarding path may be different
C. In entering the MPLS network of LER are mapped on the same the MPLS label
D. In the whole MPLS in the same network will be the LSP forwarding
正解:A,C,D
浅田** -
GB0-391の学ぶ私でも安心して読み進められるんすねPass4Testさん細かいっす。PDFファイルでダウンロードすることもできるところが大好きです。