- 1、本文档共113页,可阅读全部内容。
- 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
- 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载。
- 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
[信息与通信]Telecommunication
Telecommunication Network Security Part 2
Question: 814 | Difficulty: 1/5 | Relevancy: 3/3
Packet Filtering Firewalls can also enable access for:
only authorized application port or service numbers.
?only unauthorized application port or service numbers.
?only authorized application port or ex-service numbers.
?only authorized application port or service integers.
A. Only authorized application port or service numbers is the correct answer.? Firewall rules can be used to enable access for traffic to specific ports or services.? Service numbers is rather stilted English but you may encounter these types of wordings on the actual exam -- dont let them confuse you.
Only unauthorized application port or service numbers is incorrect.? Unauthorized ports/services would be blocked in a properly installed firewall rather than permitting access.
Only authorized application port or ex-service numbers is incorrect.? Ex-service numbers is a nonsense term meant to distract you.
Only authorized application port or service integers.? While service numbers are in fact integers, the more usual (and therefore better) answer is either service or service number.
References
CBK, p. 464
AIO3, pp. 482 - 484
Last modified 6/21/2007 R. Austin
Contributor: Rakesh Sud
Study area: CISSP CBK domain #2 - Telecommunications and Network Security
Covered topic: Firewalls and packet filters
This question ? Copyright 2003–2006 Rakesh Sud, . All rights reserved.
Question: 588 | Difficulty: 3/5 | Relevancy: 3/3
Which of the following effectively doubles the amount of hard drives needed?
?RAID Level 0
RAID Level 1
?RAID Level 2
?RAID Level 5
B. RAID Level 1 :- This level effectively doubles the amount of hard drives you need, therefore it is usually best for smaller capacity systems.Source: KRUTZ, Ronald L. VINES, Russel D., The CISSP Prep Guide: Mastering the Ten Domains of Computer Security, 2001, John Wiley Sons, Page 65.
Contributor: Rakesh Sud
Study area: CISSP CBK domain #2 - Tel
您可能关注的文档
最近下载
- 求职陷阱教学课件.pptx VIP
- 叙事护理案例分享演讲课件-.pptx VIP
- 《播音主持创作基础》对象感.ppt
- 审计学(第11版)秦荣生习题答案.pdf
- 《复变函数与积分变换》(西北工业大学)中国大学MOOC(慕课)章节测验试题(答案).pdf
- 《少数民族传统体育在幼儿园的应用研究》开题报告2800字.docx VIP
- 统编语文教科书三年级下册第七单元教学解读与集体备课.pptx VIP
- 组织行为学(第二版)第四章价值观念.pptx
- CAM软件:Siemens NX CAM二次开发_(4).UGOpenGRIP脚本编程技术.docx
- 口腔正畸主治医师资格考试(代码357)题库(含答案).pdf VIP
文档评论(0)