A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts
您可能感興趣的試卷
你可能感興趣的試題
A.resetconfig
B.restoreconfig
C.loadconfig
D.reload
A. drop
B. pass-through
C. decrypt
D. block
A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies
A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user
A.time of day
B.user agent
C.proxy port
D.usage quotas
最新試題
A single transaction can be scanned in parallel by:()
Which of these user ICAP?()
Match the log file with its role in troubleshooting.
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()
For WSA SaaS Access Control, the Identity Provider is:()
Which of these is an optional feature,requiring the purchase of a separate license after 30 days?()
Put the following features in the order they are applied.
Why does L4TM require T1 to be in promiscuous mode?()
Which statement is false?()
Bandwidth limits cannot be:()