A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
您可能感興趣的試卷
你可能感興趣的試題
A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to thedefault gateway.
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
A. routed mode
B. context mode
C. bridged mode
D. transparent mode
E. full security mode
A. Layer 1 intercontroller roaming
B. Layer 2 intercontroller roaming
C. Layer 3 intercontroller roaming
D. intracontroller roaming
A. Signal strength 0dBm, noise level 6dBm
B. Signal strength 8dBm, noise level 9dBm
C. Signal strength 4 dBm, noise level 4 dBm
D. Signal strength 6dBm, noise level 5 dBm
A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to 100 km before needing extenders
A. The access layer is the first oversubscription point in a data center design.
B. When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
C. When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
D. When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
E. The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
A. Never use passive interfaces.
B. Use NSSA areas from the core down.
C. Use totally stub areas to stop type 3 LSAs.
D. Use the lowest Ethernet interface IP address as the router ID.
E. Tune OSPF timers to enable OSPF to achieve quicker convergence
最新試題
Which two statements about Network Attached Storage are correct?()
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which two of these correctly describe Fibre Channel?()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
Which two statements about zoning are correct?()