單項(xiàng)選擇題Which statement best describes Cisco IOS Zone-Based Policy Firewall?()

A.A router interface can belong to multiple zones.
B.Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.
C.The pass action works in only one direction
D.A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題As a candidate for CCNA examination, when you are familiar with the basic commands, if you input thecommand "enable secret level 5 password" in the global mode , what does it indicate?()

A.Set the enable secret command to privilege level 5
B.The enable secret password is hashed using MD5
C.The enable secret password is for accessing exec privilege level 5
D.The enable secret password is hashed using SHA
E.The enable secret password is encrypted using Cisco proprietary level 5 encryption

5.單項(xiàng)選擇題Which description about asymmetric encryption algorithms is correct?()

A.They use the same key for encryption and decryption of data.
B.They use different keys for decryption but the same key for encryption of data.
C.They use different keys for encryption and decryption of data.
D.They use the same key for decryption but different keys for encryption of data.

最新試題

Refer to the exhibit. Which statement is correct based on the show login command output shown?()

題型:?jiǎn)雾?xiàng)選擇題

Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()

題型:?jiǎn)雾?xiàng)選擇題

For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()

題型:?jiǎn)雾?xiàng)選擇題

When configuring role-based CLI on a Cisco router,which action will be taken first ?()

題型:?jiǎn)雾?xiàng)選擇題

Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()

題型:?jiǎn)雾?xiàng)選擇題

During role-based CLI configuration, what must be enabled before any user views can be created?()

題型:?jiǎn)雾?xiàng)選擇題

Which three are distinctions between asymmetric and symmetric algorithms? ()

題型:多項(xiàng)選擇題

Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()

題型:?jiǎn)雾?xiàng)選擇題

If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()

題型:?jiǎn)雾?xiàng)選擇題

What is a static packet-filtering firewall used for ?()

題型:?jiǎn)雾?xiàng)選擇題