A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
您可能感興趣的試卷
你可能感興趣的試題
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.
A. peer-to-peer
B. partial mesh
C. hub and spoke
D. full mesh
A. intrusion protection
B. identity
C. secure connectivity
D. security management
DRAG DROP
A.Call Admission Control
B.TAPI
C.MGCP
D.SRST
最新試題
Which signal and noise values will result in the best phone communication with an access point?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
What is the recommended practice when considering VPN termination and firewall placement?()
Which of the following is the primary consideration to scale VPNs?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
Which technology allows centralized storage services to be shared across different VSANs?()
Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links