A.Signature-based detection
B.Anomaly-based detection
C.Honey pot detection
D.Policy-based detection
您可能感興趣的試卷
你可能感興趣的試題
A.aaa accounting connection start-stop tacacs+
B.aaa accounting exec start-stop tacacs+
C.aaa accounting system start-stop tacacs+
D.aaa accounting network start-stop tacacs+
Which statement is correct regarding the aaa configurations based on the exhibit provided?()
A.The authentication method list used by the vty port is named test.
B.If the TACACS+ AAA server is not available, no users will be able to establish a Telnet session with the router.
C.If the TACACS+ AAA server is not available, console access to the router can be authenticated using the local database.
D.The authentication method list used by the console port is named test.
A.Create a parser view called "root view."
B.Log in to the router as the root user.
C.Enable the root view on the router.
D.Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command.
A.SPAP
B.CHAP
C.DHCHAP
D.ESP
A.Only symmetric algorithms have a key exchange technology built in
B.Asymmetric algorithms are used quite often as key exchange protocols for symmetricalgorithms
C.Only asymmetric algorithms have a key exchange technology built in
D.Asymmetric algorithms are based on more complex mathematical computations
最新試題
What is a static packet-filtering firewall used for ?()
What are two characteristics of the SDM Security Audit wizard?()
Which option ensures that data is not modified in transit?()
Which statement is true about a Smurf attack?()
Which method is of gaining access to a system that bypasses normal security measures?()
In an IEEE 802.1x deployment,between which two devices EAPOL messages typically are sent?()
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
During role-based CLI configuration, what must be enabled before any user views can be created?()
Which VoIP components can permit or deny a call attempt on the basis of a network’s available bandwidth?()
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()