A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
您可能感興趣的試卷
你可能感興趣的試題
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
A. intrusion protection
B. identity
C. secure connectivity
D. security management
A.1
B.2
C.3
D.4
A. PortFast
B. UplinkFast
C. loop guard
D. root guard
E. BPDU guard
F. BackboneFast
最新試題
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
Which technology allows centralized storage services to be shared across different VSANs?()
During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()
What is the recommended practice when considering VPN termination and firewall placement?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()