A. 3 promiscuous sensors
B. 3 inline sensors
C. 1 inline sensor, 1 promiscuous sensor
D. 2 inline sensors, 1 promiscuous sensors
您可能感興趣的試卷
你可能感興趣的試題
A. nat (inside) 0 209.165.202.150 255.255.255.255
B. access-list no-nat permit ip host209.165.202.150 anynat(inside) 0 access-list no-nat
C. static(inside,outside) 209.165.202.150 209.165.202.150 netmask 255.255.255.255
D. no nat-control
E. nat (inside) 1 209.165.202.150 255.255.255.255
A. nat
B. nonat-control
C. access-list
D. none of the above
A. All traffic passing through theappliance
B. Traffic from internal networks on a per IP basis
C. Based on protocol only.
D. On a per-context basis only.
A. show asp drop
B. show counters drop
C. show security-policy
D. show policy-map
A. http-map, tcp-map, class-map
B. class-map, tcp-map, policy-map
C. class-map, policy-map, service-map
D. class-map, service-policy, policy-map
最新試題
Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()
CSA protects your host by: ()
With PGP, which of the following entity signs a users’s public key?()
Choose the most correct statements about SMTP/ESMTP. ()
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()
Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()
Which of the following is an example of a security technology that could be enabled by Netflow?()
Cisco Clean Access ensures that computers connecting to your network have which of the following?()