A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
您可能感興趣的試卷
你可能感興趣的試題
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
A. intrusion protection
B. identity
C. secure connectivity
D. security management
A. Easy VPN
B. IPsec GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
A. 1
B. 2
C. 3
D. 4
A. full mesh
B. peer-to-peer
C. partial mesh
D. hub and spoke
A. IGRP
B. RIP
C. RIPv2
D. OSPF
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IPS interface and exits on another
A. route list
B. route group
C. gateway list
D. route pattern
A. Use a static ip addresses based on incoming user policies.
B. Use DHCP to assign addresses based on incoming user policies.
C. Deploy a clientless model to assign a unique address to the user.
D. Deploy RADIUS or LDAP to assign the address to the user.
最新試題
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
Which three of the following descriptions are true about the firewall modes? ()
What are two characteristics of the SLB One-arm mode? ()
What are two characteristics of OER? ()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which path selection protocol is used by Fibre Channel fabrics?()
Which two statements about Network Attached Storage are correct?()
Which two statements about FCIP and iSCSI are correct?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()