A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network
您可能感興趣的試卷
你可能感興趣的試題
A. Employ path MTU discovery.
B. Set the MTU higher than 1500 bytes.
C. Turn off pre-fragmentation for IPSec.
D. Set the MTU value to 1400 bytes.
A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio
Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()
A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization
A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.
A.Delay should be no more than 10 ms.
B.Loss should be no more than1 percent.
C.Jitter should be less then 40 ms.
D.Managed bandwidth is strongly recommended for voice control traffic.
最新試題
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
What is the recommended practice when considering VPN termination and firewall placement?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Which of the following is the primary consideration to scale VPNs?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()