多項選擇題Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network


您可能感興趣的試卷

你可能感興趣的試題

4.多項選擇題


Which two of these are correct regarding the recommended practice for distribution layer designbased on the following configuration?()

A. use a Layer 2 link between distribution switches
B. use a Layer 3 link between distribution switches
C. use a redundant link to the core
D. use a Layer 3 link between distribution switches with route summarization

6.單項選擇題Which one is not the feature of the Cisco Unified Wireless Network architecture?()

A. network unification
B. remote access
C. mobility services
D. network management

7.多項選擇題What two choices can you make when redundancy is required from a branch office to a regional office? ()

A. multiple Frame Relay PVCs
B. dual Wan links to the regional office
C. dual Wan links to another branch office
D. single links - one to the regional office and one to another branch office

10.單項選擇題Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

A. Use default Layer 4 hash in core.
B. Use default Layer 3 hash in distribution.
C. Use default Layer 4 hash in distribution.
D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.

最新試題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項選擇題

During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:單項選擇題

Which statement correctly describes a situation in which VRFs are used in the data center?()

題型:單項選擇題

Which two statements about Network Attached Storage are correct?()

題型:多項選擇題

Which two statements about Cisco Security Management Suite are correct? ()

題型:多項選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項選擇題

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

題型:單項選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項選擇題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項選擇題