A.mode configuration
B.the VPN client establishment of an ISAKMP SA
C.IPsec quick mode completion of the connection
D.VPN client initiation of the IKE phase 1 process
您可能感興趣的試卷
你可能感興趣的試題
A.DDoS signatures
B.strong signatures
C.exploit signatures
D.numeric signatures
E.spoofing signatures
F.connection signatures
A.The IPS is in the traffic path.
B.Only one active interface is required.
C.Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
D.When malicious traffic is detected,the IPS will only send an alert to a management station.
A.The IDS is in the traffic path.
B.The IDS can send TCP resets to the source device.
C.The IDS can send TCP resets to the destination device.
D.The IDS listens promiscuously to all traffic on the network.
E.Default operation is for the IDS to discard malicious traffic.
A.All traffic is permitted from the inbound to the outbound interface upon successful authentication of the user.
B.A specific access profile is retrieved from a TACACS+ or RADIUS server and applied to an IOS Firewall based on user provided credentials.
C.Prior to responding to a proxy ARP,the router will prompt the user for a login and password which are authenticated based on the configured AAA policy.
D.The proxy server capabilities of the IOS Firewall are enabled upon successful authentication of the user.
A.network-based application recognition (NBAR)
B.authentication proxy
C.stateful packet filtering
D.AAA services
E.proxy server
F.IPS
最新試題
Which three categories of signatures can a Cisco IPS microengine identify?()
Which two statements are true about broadband cable (HFC) systems?()
What are two possible actions an IOS IPS can take if a packet in a session matches a signature?()
Refer to the exhibit. Which statement is true about the configuration of split tunnels using SDM?()
Which three MPLS statements are true?()
Refer to the exhibit. Which statement is true about the partial MPLS configuration that is shown?()
Which two statements about an IDS are true?()
Refer to the exhibit. What type of security solution will be provided for the inside network?()
Which statement is true when ICMP echo and echo-reply are disabled on edge devices?()
Which form of DSL technology is typically used as a replacement for T1 lines?()