A.A custom application security policy can be configured in the Advanced Firewall Security Configuration dialog box.
B.An optional DMZ interface can be specified in the Advanced Firewall Interface Configuration dialog box.
C.Custom application policies for e-mail, instant messaging, HTTP, and peer-to-peer services can be created using the Intermediate Firewall wizard.
D.Only the outside (untrusted) interface is specified in the Basic Firewall Interface Configuration dialog box.
E.The outside interface that SDM can be launched from is configured in the Configuring Firewall for Remote Access dialog box.
F.The SDM provides a basic, intermediate, and advanced firewall wizard.
您可能感興趣的試卷
你可能感興趣的試題
A.VDSL
B.HDSL
C.ADSL
D.SDSL
Refer to the exhibit.
Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
A.The command access-list 110 permit gre must be configured to specify which traffic will be encrypted.
B.The command access-list 110 permit ip must be configured to specify which hosts can use the tunnel.
C.The tunnel destination 172.17.63.18 command must be configured on the Tunnel0 interface.
D.The tunnel mode gre command must be configured on the Tunnel0 interface.
E.The tunnel source Ethernet1 command must be configured on the Tunnel0 interface.
F.The tunnel source Tunnel0 command must be configured on the Tunnel0 interface.
A.AlarmSeverity
B.AlarmKeepalive
C.AlarmTraits
D.EventMedia
E.EventAlarm
F.EventAction
A.Cable modems only operate at Layer 1 of the OSI model.
B.Cable modems operate at Layers 1 and 2 of the OSI model.
C.Cable modems operate at Layers 1, 2, and 3 of the OSI model.
D.A function of the cable modem termination system (CMTS) is to convert the modulated signal from the cable modem into a digital signal.
E.A function of the cable modem termination system is to convert the digital data stream from the end user host into a modulated RF signal for transmission onto the cable system.
A.Dead Peer Detection (DPD)
B.CDP
C.isakmp keepalives
D.GRE keepalive mechanism
E.The hello mechanism of the routing protocol across the IPsec tunnel
最新試題
Refer to the exhibit, which shows a PPPoA diagram and partial SOHO77 configuration.Which command needs to be applied to the SOHO77 to complete the configuration?()
Which statement describes the Authentication Proxy feature?()
Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()
When configuring the Cisco VPN Client,what action is required prior to installing Mutual Group Authentication?()
What is a reason for implementing MPLS in a network?()
Which three categories of signatures can a Cisco IPS microengine identify?()
Refer to the exhibit.Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
Which statement about an IPS is true?()
Which form of DSL technology is typically used as a replacement for T1 lines?()
What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()