A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures
您可能感興趣的試卷
你可能感興趣的試題
A.The IPS is in the traffic path.
B.Only one active interface is required.
C.Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
D.When malicious traffic is detected,the IPS will only send an alert to a management station.
A.The IDS is in the traffic path.
B.The IDS can send TCP resets to the source device.
C.The IDS can send TCP resets to the destination device.
D.The IDS listens promiscuously to all traffic on the network.
E.Default operation is for the IDS to discard malicious traffic.
A.All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
B.A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
C.Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
D.The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
A.network-based application recognition (NBAR)
B.authentication proxy
C.stateful packet filtering
D.AAA services
E.proxy server
F.IPS
A.The IP inspection rule can be applied in the inbound direction on the secured interface.
B.The IP inspection rule can be applied in the outbound direction on the unsecured interface.
C.The ACL applied in the outbound direction on the unsecured interface should be an extended ACL.
D.The ACL applied in the inbound direction on the unsecured interface should be an extended ACL.
E.For temporary openings to be created dynamically by Cisco IOS Firewall,the access-list for thereturning traffic must be a standard ACL.
F.For temporary openings to be created dynamically by Cisco IOS Firewall,the IP inspection rule must be applied to the secured interface.
最新試題
Which three statements about IOS Firewall configurations are true?()
Refer to the exhibit.Which three statements describe the steps that are required to configure an IPsec site-to-site VPN using a GRE tunnel?()
Which two mechanisms can be used to detect IPsec GRE tunnel failures?()
During the Easy VPN Remote connection process,which phase involves pushing the IP address, Domain Name System (DNS),and split tunnel attributes to the client?()
Which statement describes the Authentication Proxy feature?()
What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()
Which two statements about an IDS are true?()
Refer to the exhibit. Which statement about the authentication process is true?()
Which statement describes Reverse Route Injection (RRI)?()
What are three features of the Cisco IOS Firewall feature set?()