A.pop3
B.ftp
C.12tp
D.sql-net
您可能感興趣的試卷
你可能感興趣的試題
A.SCSI
B.HBA
C.ATA
D.iSCSI
A.AES
B.3DES
C.DES
D.Diffie-Hellman
Which item is the correct matching relationships associated with IKE Phase?()
A.IKE Phase 1 - P4S1 and P4S4,IKE Phase 2 - P4S2, P4S3 and P4S5
B.IKE Phase 1 - P4S2 and P4S4,IKE Phase 2 - P4S1, P4S3 and P4S5
C.IKE Phase 1 - P4S2 and P4S3,IKE Phase 2 - P4S1, P4S4 and P4S5
D.IKE Phase 1 - P4S1 and P4S2,IKE Phase 2 - P4S3, P4S4 and P4S5
A.Strategic security planning
B.Disaster recovery
C.Implementation security
D.Operations security
A.aaa authentication enable method default
B.aaa authentication enable default
C.aaa authentication enable level
D.aaa authentication enable default local
A.Stateful firewall
B.Proxy firewall
C.Packet filtering firewall
D.Stateless firewall
A.It is restricted in size to only three segments
B.It requires the use of netBT as the network protocol
C.It requires the implementation of IKE
D.It relies on an underlying Public Key Infrastructure
A.Segment security zones
B.Restrict access to firewalls
C.Use logs and alerts
D.Set connection limits
A.Business needs
B.Risk analysis
C.Security policy
D.Best practices
A.PKCS #7
B.PKCS #8
C.PKCS #10
D.PKCS #12
最新試題
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
On the basis of the show policy-map type inspect zone-pair session command output provided in theexhibit.What can be determined about this Cisco IOS zone based firewall policy?()
Which statement is true about a Smurf attack?()
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
For the following options, which feature is the foundation of Cisco Self-Defending Network technology?()
During role-based CLI configuration, what must be enabled before any user views can be created?()
If you click the Configure button along the top of Cisco SDM is graphical interface,which Tasks buttonpermits you to configure such features as SSH, NTP, SNMP, and syslog?()
How do you define the authentication method that will be used with AAA?()