單項選擇題What Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX?()

A.Configuration interceptor
B.Network interceptor
C.File system interceptor
D.Execution space interceptor


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three items are Cisco best-practice recommendations for securing a network?()

A.Routinely apply patches to operating systems and applications
B.Disable unneeded services and ports on hosts
C.Deploy HIPS software on all end-user workstations
D.Require strong passwords and enable password expiration

2.單項選擇題Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()

A.Cisco IOS router
B.Cisco PIX 500 series security appliance
C.Cisco 4200 series IPS appliance
D.Cisco ASA 5500 series security appliance

3.單項選擇題Before a Diffie-Hellman exchange may begin, the two parties involved must agree on what?()

A.Two secret keys
B.Two nonsecret keys
C.Two secret numbers
D.Two nonsecret numbers

4.單項選擇題

Based on the username global configuration mode command displayed in the exhibit. What does the optionsecret 5 indicate about the enable secret password?()

A.It is hashed using MD5
B.It is encrypted using a proprietary Cisco encryption algorithm
C.It is hashed using SHA
D.It is encrypted using DH group 5

最新試題

During role-based CLI configuration, what must be enabled before any user views can be created?()

題型:單項選擇題

Which statement is correct regarding the aaa configurations based on the exhibit provided?()

題型:單項選擇題

Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()

題型:單項選擇題

Which VoIP components can permit or deny a call attempt on the basis of a network’s available bandwidth?()

題型:單項選擇題

What is the objective of Diffie-Hellman?()

題型:單項選擇題

On the basis of the show policy-map type inspect zone-pair session command output provided in theexhibit.What can be determined about this Cisco IOS zone based firewall policy?()

題型:單項選擇題

As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()

題型:單項選擇題

Which one of the Cisco IOS commands can be used to verify that either the Cisco IOS image, theconfiguration files,or both have been properly backed up and secured?()

題型:單項選擇題

Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()

題型:單項選擇題

Which information is stored in the stateful session flow table while using a stateful firewall?()

題型:單項選擇題