DRAG DROP
您可能感興趣的試卷
你可能感興趣的試題
A. reliability
B. scalability
C. redundancy
D. manageability
A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.
A. peer-to-peer
B. partial mesh
C. hub and spoke
D. full mesh
A. intrusion protection
B. identity
C. secure connectivity
D. security management
最新試題
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
Which of the following is the primary consideration to scale VPNs?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
Which technology allows centralized storage services to be shared across different VSANs?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
What is the recommended practice when considering VPN termination and firewall placement?()