A. The signatures available are built into the IOS code.
B. Toupdate signatures youneed to install a new IOS image
C. To activate new signatures you download a new Signature DefiitionFile (SDF) from Cisco’s web site
D. Loading and enabling selected IPS signatures is user configurable
E. Cisco IOS onlyprovides Intrusion Detection functionality
F. Cisco IOS-IPS requires a network module installed in your router running sensor software
您可能感興趣的試卷
你可能感興趣的試題
A. The Pre-Block ACL is overwritten when a blockingaction is initiatied by the sensor
B. The blocking ACL entries generated by the sensor override the Pre-Block ACL entries
C. The Pre-Block ACL entries override the blocking ACL entries generated by the sensor
D. The Pre-Block ACL is replaced by the Post-Block ACL when a blocking actionis initiated bythe sensor
E. You can not configure a Pre-Block ACL when configuring IP Blockingon your sensor
A. 224.21.106.44
B. 224.25.106.44
C. 233.149.106.44
D. 236.25.106.44
E. 239.153.106.44
A. 00-00-1C-EF-00-00
B. 01-00-5E-00-00-05
C. 01-00-5E-EF-00-00
D. EF-FF-FF-00-00-05
E. EF-00-00-FF-FF-FF
F. FF-FF-FF-FF-FF-FF
A. 224.0.4.86
B. 224.4.86.0
C. 233.1.200.0
D. 239.2.213.0
E. 239.4.5.6
A. CDPmust be enabled on all switches in theVTP management domain.
B. All switches in the VTPdomain must run the same version of VTP.
C. When using secure mode VTP, only configure management domain passwords onVTP servers.
D. EnablingVTP pruning on a server willenable the feature for the entire management domain.
E. Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.
最新試題
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()
Which IOS QoS mechanism is used strictly to rate limit traffic destinedto the router itself?()
Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()
CSA protects your host by: ()
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()
Which two statements are correct about the aaa authentication login default grouptacacs+ localglobal configuration command? ()
When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()
Which one of the following is NOT a supported IKE attribute?()
Choose the most correct statements about SMTP/ESMTP. ()
CS-MARS works with which IOS feature to accomplish anomaly detection?()