多項選擇題As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()

A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題The Cisco NAC Appliance is able to check which three items before allowing network access?()

A. client antivirus software state
B. personal firewall settings
C. wireless cell bandwidth availability
D. IOS versions for routers and switches
E. appropriate client patch management level
F. appropriate QoS settings for client application

2.多項選擇題Which three mechanisms are used to secure management traffic from outside IPS sensors?()

A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports

4.多項選擇題Which two statements about FCIP and iSCSI are correct?()

A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. The iSCSI stack supports block-level storage for remote devices.
E. The purpose of iSCSI is to provide connectivity between separate wide-area SANs.

5.多項選擇題Which two statements about Network Attached Storage are correct?()

A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.

7.多項選擇題Which three of the following descriptions are true about the firewall modes? ()

A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.

8.單項選擇題Which path selection protocol is used by Fibre Channel fabrics?()

A. IVR
B. VoQ
C. FSPF
D. VSANs
E. SANTap

10.多項選擇題Which two statements about zoning are correct?()

A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.