A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
您可能感興趣的試卷
你可能感興趣的試題
A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices withtrunking
D. between two Layer 2 devices withouttrunking
E. between a Layer 2 device and a Layer 3 device withtrunking
A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
最新試題
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()