A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IPS interface and exits on another
您可能感興趣的試卷
你可能感興趣的試題
A. route list
B. route group
C. gateway list
D. route pattern
A. Use a staticip addresses based on incoming user policies.
B. Use DHCP to assign addresses based on incoming user policies.
C. Deploy a clientless model to assign a unique address to the user.
D. Deploy RADIUS or LDAP to assign the address to the user.
A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
A. signal strength 5dBm
B. signal strength 6dBm
C. noise level 4dBm
D. noise level 5dBm
A. transparent
B. proxy
C. reverse proxy
D. direct
最新試題
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
Which technology allows centralized storage services to be shared across different VSANs?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which three of these are important when determining NAS Server scaling? ()