A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
您可能感興趣的試卷
你可能感興趣的試題
A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking
A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to thedefault gateway.
A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
最新試題
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
Which statement about Fibre Channel communications is correct?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
What are two characteristics of the SLB One-arm mode? ()
Which two statements about Cisco Security Management Suite are correct? ()
Which two statements about Network Attached Storage are correct?()
What is the traditional mode for a firewall?()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()