多項(xiàng)選擇題As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()

A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which three of the following descriptions are true about the firewall modes? ()

A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.

2.多項(xiàng)選擇題Which two statements about an interface configured with the asr-group command are correct? ()

A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to thedefault gateway.

3.多項(xiàng)選擇題Which two statements about Cisco Security Management Suite are correct? ()

A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.

4.單項(xiàng)選擇題What is the traditional mode for a firewall?()

A. routed mode
B. context mode
C. bridged mode
D. transparent mode
E. full security mode

5.單項(xiàng)選擇題Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

A. Layer 1 intercontroller roaming
B. Layer 2 intercontroller roaming
C. Layer 3 intercontroller roaming
D. intracontroller roaming

6.單項(xiàng)選擇題Which signal and noise values will result in the best phone communication with an access point?()

A. Signal strength 0dBm, noise level 6dBm
B. Signal strength 8dBm, noise level 9dBm
C. Signal strength 4 dBm, noise level 4 dBm
D. Signal strength 6dBm, noise level 5 dBm

7.多項(xiàng)選擇題Which two of these correctly describe Fibre Channel?()

A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to 100 km before needing extenders

8.單項(xiàng)選擇題Which statement about data center access layer design modes is correct?()

A. The access layer is the first oversubscription point in a data center design.
B. When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
C. When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
D. When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
E. The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.

9.多項(xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()

 

A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.

10.多項(xiàng)選擇題Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

A. Never use passive interfaces.
B. Use NSSA areas from the core down.
C. Use totally stub areas to stop type 3 LSAs.
D. Use the lowest Ethernet interface IP address as the router ID.
E. Tune OSPF timers to enable OSPF to achieve quicker convergence

最新試題

Which two statements about Network Attached Storage are correct?()

題型:多項(xiàng)選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項(xiàng)選擇題

In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()

題型:多項(xiàng)選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項(xiàng)選擇題

Which two of these correctly describe Fibre Channel?()

題型:多項(xiàng)選擇題

Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

題型:多項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:?jiǎn)雾?xiàng)選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about zoning are correct?()

題型:多項(xiàng)選擇題