多項(xiàng)選擇題Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()

A. core layer
B. bridging two VLANs on one switch
C. between two Layer 2 devices withtrunking
D. between two Layer 2 devices withouttrunking


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題In base e-Commerce module designs, where should firewall perimeters be placed?()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers


3.多項(xiàng)選擇題Which three best practices should be implemented at the campus backbone submodule to support the server farm module?()

A. Implement highly redundant switching and links with no single points or paths of failure.
B. Implement server load balancing.
C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D. Implement intrusion detection with automatic notification of intrusion attempts in place.

4.多項(xiàng)選擇題Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network

5.多項(xiàng)選擇題Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? ()

A. IP telephony
B. security
C. IP multicasting
D. QoS

最新試題

As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()

題型:?jiǎn)雾?xiàng)選擇題

Which two of these are advantages of placing the VPN device parallel to the firewall?()

題型:多項(xiàng)選擇題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:?jiǎn)雾?xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()

題型:?jiǎn)雾?xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.

題型:?jiǎn)雾?xiàng)選擇題

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

題型:?jiǎn)雾?xiàng)選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:?jiǎn)雾?xiàng)選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項(xiàng)選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:?jiǎn)雾?xiàng)選擇題