A. host security
B. perimeter security
C. security monitoring
D. policy management
您可能感興趣的試卷
你可能感興趣的試題
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A. 3
B. 6
C. 7
D. 8
The Cisco IOS SLB feature is a Cisco IOS-based solution that provides server load balancing.
This feature allows you to define a virtual server that represents a cluster of real servers, known asa server farm.
When a client initiates a connection to the virtual server, the IOS SLB load balances theconnection to a chosen real server, depending on the configured load balance algorithm orpredictor.
Which three implementation modes may be used to deploy SLB? ()
A. Router mode
B. One-arm mode
C. Three-arm mode
D. Bridge mode inline
A. 4
B. 6
C. 7
D. 10
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
最新試題
Which statement about data center access layer design modes is correct?()
Which statement about Fibre Channel communications is correct?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
Which two statements about zoning are correct?()
Which three of the following descriptions are true about the firewall modes? ()
During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which two statements about Cisco Security Management Suite are correct? ()
Which two statements about Network Attached Storage are correct?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()