多項(xiàng)選擇題Which three mechanisms are used to secure management traffic from outside IPS sensors?()

A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題In which two locations in an enterprise network can an IPS sensor be placed? ()

A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking

2.多項(xiàng)選擇題Which two of these correctly describe asymmetric routing and firewalls? ()

A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover

3.多項(xiàng)選擇題Which two statements about an interface configured with the asr-group command are correct? ()

A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to thedefault gateway.

4.多項(xiàng)選擇題Which three of the following descriptions are true about the firewall modes? ()

A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.

5.單項(xiàng)選擇題What is the traditional mode for a firewall?()

A. routed mode
B. context mode
C. bridged mode
D. transparent mode
E. full security mode

最新試題

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()

題型:多項(xiàng)選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:?jiǎn)雾?xiàng)選擇題

Which two of these correctly describe Fibre Channel?()

題型:多項(xiàng)選擇題

Which statement about data center access layer design modes is correct?()

題型:?jiǎn)雾?xiàng)選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:?jiǎn)雾?xiàng)選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:?jiǎn)雾?xiàng)選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項(xiàng)選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:?jiǎn)雾?xiàng)選擇題