题目

A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic? ()

A、 NIC filtering is enabled.

B、 Port security is configured.

C、 NIC is not in promiscuous mode.

D、 NIC is in promiscuous mode.

答案
查看答案
相关试题

Which three settings are accessible from the serial console menu on a MAG Series device?()

A

The ping command

B

Factory default reset

C

Personality image

D

License imports

E

Admin login credentials

Given the two security constraints in a deployment descriptor: 101. 102.  103.SALES 104.SALES 105. 106. 107. 108.  109. 110. If the two security constraints have the same url-pattern and http-method which two inserted independentlyat line 109,will allow users with role names of either SALES or MARKETING to access this resource?()

A

B

*

C

ANY

D

MARKETING

You are installing a new deployment of the Junos Pulse Access Control Service. You have an existing RADIUS server that has a populated user file. You are considering using the RADIUS proxy feature.Which consideration must you take into account?()

A、Your RADIUS server database must be replicated onto another device for redundancy.

B、Inner proxy creates a tunnel between the supplicant and the external server.

C、RADIUS proxy causes the role assignment process to be skipped.

D、Outer proxy configuration passes authentication data to the external RADIUS server in clear text.

Which security mechanism uses the concept of a realm?()

A、Authorization

B、Data integrity

C、Confidentiality

D、Authentication

Which of the following server types stores users’ home directory folders?()

A、Application

B、File

C、Directory services

D、Print

最新解答的试题