A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
您可能感興趣的試卷
你可能感興趣的試題
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices withtrunking
D. between two Layer 2 devices withouttrunking
E. between a Layer 2 device and a Layer 3 device withtrunking
A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
A.routed mode
B.context mode
C.bridged mode
D.transparent mode
E.full security mode
最新試題
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Which signal and noise values will result in the best phone communication with an access point?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Which of the following is the primary consideration to scale VPNs?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
Which three of these are important when determining NAS Server scaling? ()