A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
您可能感興趣的試卷
你可能感興趣的試題
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices withtrunking
D. between two Layer 2 devices withouttrunking
E. between a Layer 2 device and a Layer 3 device withtrunking
A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
A.routed mode
B.context mode
C.bridged mode
D.transparent mode
E.full security mode
最新試題
What is the recommended practice when considering VPN termination and firewall placement?()
During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
Which technology allows centralized storage services to be shared across different VSANs?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()