A. intrusion protection
B. identity
C. secure connectivity
D. security management
您可能感興趣的試卷
你可能感興趣的試題
A. Easy VPN
B. IPsec GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
A. 1
B. 2
C. 3
D. 4
A. full mesh
B. peer-to-peer
C. partial mesh
D. hub and spoke
A. IGRP
B. RIP
C. RIPv2
D. OSPF
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IPS interface and exits on another
最新試題
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Which two statements about Network Attached Storage are correct?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
What are two characteristics of the SLB One-arm mode? ()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Which two statements about Cisco Security Management Suite are correct? ()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()