A. intrusion protection
B. identity
C. secure connectivity
D. security management
您可能感興趣的試卷
你可能感興趣的試題
A. Easy VPN
B. IPsec GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
A. 1
B. 2
C. 3
D. 4
A. full mesh
B. peer-to-peer
C. partial mesh
D. hub and spoke
A. IGRP
B. RIP
C. RIPv2
D. OSPF
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IPS interface and exits on another
A. route list
B. route group
C. gateway list
D. route pattern
A. Use a static ip addresses based on incoming user policies.
B. Use DHCP to assign addresses based on incoming user policies.
C. Deploy a clientless model to assign a unique address to the user.
D. Deploy RADIUS or LDAP to assign the address to the user.
A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
A. signal strength 5dBm
B. signal strength 6dBm
C. noise level 4dBm
D. noise level 5dBm
A. transparent
B. proxy
C. reverse proxy
D. direct
最新試題
Which path selection protocol is used by Fibre Channel fabrics?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
Which two statements about zoning are correct?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which three of the following descriptions are true about the firewall modes? ()
Which two statements about an interface configured with the asr-group command are correct? ()
Which two of these correctly describe Fibre Channel?()
Which statement about data center access layer design modes is correct?()
Which two statements about FCIP and iSCSI are correct?()