A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
您可能感興趣的試卷
你可能感興趣的試題
A. Layer 2 mode
B. Layer 3 Edge mode
C. Layer 3 Central mode
D. Layer 3 In-Band mode
A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to 100 km before needing extenders
A. client antivirus software state
B. personal firewall settings
C. wireless cell bandwidth availability
D. IOS versions for routers and switches
E. appropriate client patch management level
F. appropriate QoS settings for client application
A. IVR
B. VoQ
C. FSPF
D. VSANs
E. SANTap
A. Partitioning of network resources is enabled.
B. VRFs cannot support path isolation from MAN/WAN designs.
C. VRFs cannot be used to map a virtualized data center to a MPLS implementation.
D. VRFs do not allow for the use of application services with multiple access topologies.
E. An access design using a VRF allows for an aggregation layer service module solution.
A. 50
B. 100
C. 150
D. 200
E. 250
A. It can take on HSRP, VRRP, and GLBP as clients.
B. It provides automatic inbound route optimization.
C. Path selection may be based on delay, loss, or jitter.
D. The border router makes decisions about which outbound path to use.
E. Automatic load distribution is provided for multiple connections.
A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D. all ISLs contained within a single chassis
E. higher latency and throughput than a core-edge design switch
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to thedefault gateway.
A. Signal strength 0dBm, noise level 6dBm
B. Signal strength 8dBm, noise level 9dBm
C. Signal strength 4 dBm, noise level 4 dBm
D. Signal strength 6dBm, noise level 5 dBm
最新試題
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
Which three of the following descriptions are true about the firewall modes? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which path selection protocol is used by Fibre Channel fabrics?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Which statement about Fibre Channel communications is correct?()
What is the recommended radius of a cell for a voice-ready wireless network?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which statement about data center access layer design modes is correct?()