A. AirDefense for wireless IDS is required by autonomous APs.
B. 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C. APs only monitor the RF channels that are servicing the clients.
D. Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E. Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
您可能感興趣的試卷
你可能感興趣的試題
A. 48 Ethernet 10/100 ports
B. Fast Ethernet and Gigabit Ethernet connectivity
C. dual-purpose copper or fiber uplinks
D. standalone fixed-configuration Layer 2 switching
A. security contexts
B.- transparent firewall
C. WebVPN
D. Active/Active failover
E. low latency queuing
F. AIP-SSM intrusion prevention
A. the large enterprise with a global presence
B. the large enterprise with a single campus
C. the small- or medium-sized business
D. All companies, regardless of size
Which two methods enable a PC connected to the PartnerNet to connect to a server on DMZ1 but deny it access to both DMZ2 and the Inside network? (Choose two.)()
A. Enable port address translation for traffic sourced from the PartnerNet PC to the DMZ1 server.
B. Disable NAT control on DM72 and the Inside interfaces only.
C. Enable static NAT translation for the DMZ1 server, and then use an ACL to permit the PartnerNet PC traffic to the DMZ1 server.
D. Disable NAT control on the DMZ1 interface only.
E. Lower the security level of the DMZ2 interface to 30.
F. Raise the security level of the PartnerNet interface to 55.
A. 10.0.0.0/24
B. 10.0.0.0/16
C. 10.0.0.0/14
D. 10.0.0.0/15
最新試題
Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft? ()
What is the purpose of the Dynamic Configuration Tool? ()
List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()
Which two of these statements best describe the benefits of WPAv1? ()
Which two of these statements best describe fast secure roaming? (Choose two.)()
Which of these best describes the Cisco Lifecycle Services approach? ()
The Cisco SDM can configure most, but not all, routing protocols. Which two of these routing protocols can be configured using SDM? (Choose two.)()
Which of these is a benefit of an integrated security management system? ()
What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()
Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()