A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
您可能感興趣的試卷
你可能感興趣的試題
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
A. intrusion protection
B. identity
C. secure connectivity
D. security management
A. Easy VPN
B. IPsec GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
A. 1
B. 2
C. 3
D. 4
最新試題
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
Which two statements about Network Attached Storage are correct?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
Which two statements about an interface configured with the asr-group command are correct? ()
Which path selection protocol is used by Fibre Channel fabrics?()
In which two locations in an enterprise network can an IPS sensor be placed? ()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()