單項選擇題Which statement about IDS/IPS design is correct?()

A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.


您可能感興趣的試卷

你可能感興趣的試題

2.單項選擇題As an experienced technician, you are responsible for Technical Support. Which of the followingdescriptions is correct about the characteristic of SLB one arm mode?()

A. This out-of-band approach supports scaling
B. SLB· is not inline.
C. Mode is not as common as bridge or routed mode.
D. Return traffic requires PB·R, server default gateway pointing to SLB·, or client source NAT·

3.單項選擇題As an experienced technician, you are responsible for Technical Support. A customer calls to askthe best signal level and noise level for cell phone. How to respond?()

A. -40dBm signal and -90dBm noise
B. -50dBm signal and -90dBm noise
C. -30dBm signal and -90dBm noise
D. -20dBm signal and -90dBm noise

最新試題

Which two of these correctly describe asymmetric routing and firewalls? ()

題型:多項選擇題

To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()

題型:單項選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項選擇題

Which statement about data center access layer design modes is correct?()

題型:單項選擇題

What are two characteristics of GSS? ()

題型:多項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項選擇題

Which two statements about Cisco Security Management Suite are correct? ()

題型:多項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題