A.Segment security zones
B.Restrict access to firewalls
C.Use logs and alerts
D.Set connection limits
您可能感興趣的試卷
你可能感興趣的試題
A.Business needs
B.Risk analysis
C.Security policy
D.Best practices
A.PKCS #7
B.PKCS #8
C.PKCS #10
D.PKCS #12
A.Uplink Fast
B.Port Fast
C.BPDU Guard
D.Root Guard
A.BPA attack
B.Adaptive chosen ciphertext attack
C.DDoS attack
D.Man-in-the-middle attack
A.takes a snapshot of the router running configuration and securely archives it in persistent storage
B.stores a secured copy of the Cisco IOS image in its persistent storage
C.backs up the Cisco IOS image from flash to a TFTP server
D.enables Cisco IOS image resilience
最新試題
During role-based CLI configuration, what must be enabled before any user views can be created?()
What is a static packet-filtering firewall used for ?()
Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
On the basis of the show policy-map type inspect zone-pair session command output provided in theexhibit.What can be determined about this Cisco IOS zone based firewall policy?()
Refer to the exhibit. Based on the VPN connection shown, which statement is true?()
As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
How do you define the authentication method that will be used with AAA?()
Which statement is true about a Smurf attack?()