A.Stateful firewall
B.Proxy firewall
C.Packet filtering firewall
D.Stateless firewall
您可能感興趣的試卷
你可能感興趣的試題
A.It is restricted in size to only three segments
B.It requires the use of netBT as the network protocol
C.It requires the implementation of IKE
D.It relies on an underlying Public Key Infrastructure
A.Segment security zones
B.Restrict access to firewalls
C.Use logs and alerts
D.Set connection limits
A.Business needs
B.Risk analysis
C.Security policy
D.Best practices
A.PKCS #7
B.PKCS #8
C.PKCS #10
D.PKCS #12
A.Uplink Fast
B.Port Fast
C.BPDU Guard
D.Root Guard
最新試題
For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()
Which two primary port authentication protocols are used with VSANs?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
Which three are distinctions between asymmetric and symmetric algorithms? ()
Which VoIP components can permit or deny a call attempt on the basis of a network’s available bandwidth?()
How do you define the authentication method that will be used with AAA?()
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
What is the objective of Diffie-Hellman?()
During role-based CLI configuration, what must be enabled before any user views can be created?()
Please choose the correct description about Cisco Self-Defending Network characteristics.()