A. make log
B. log config
C. w3c log config
D. advance dproxy config
E. mklog file
您可能感興趣的試卷
你可能感興趣的試題
A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts
A.resetconfig
B.restoreconfig
C.loadconfig
D.reload
A. drop
B. pass-through
C. decrypt
D. block
A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies
A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user
最新試題
Which of these user ICAP?()
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()
Which of these can not be used in defining policies?()
Which of these is not part of the pre_ installation worksheet?()
Match the interface with the use on the WSA.
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
Which of these is a drawback in using McAfee heuristic scanning?()
Which credentials must be entered into the S-Series GUI when joining the Active domain?()
Which CLI command is used to create a W3C log?()
Which of these is not an action that is associated with HTTPS decryption policies?()