單項(xiàng)選擇題What is the traditional mode for a firewall?()

A.routed mode
B.context mode
C.bridged mode
D.transparent mode
E.full security mode


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題What are two characteristics of GSS?()

A. It helps verify end-to-end path availability.
B. It provides traffic rerouting in case of disaster.
C. HSRP, GLBP, and VRRP can be clients of GSS.
D. BGP must be the routing protocol between the distributed data centers.
E. DNS responsiveness is improved by providing centralized domain management.

2.多項(xiàng)選擇題What are two characteristics of OER? ()

A. It can take on HSRP, VRRP, and GLBP as clients.
B. It provides automatic inbound route optimization.
C. Path selection may be based on delay, loss, or jitter.
D. The border router makes decisions about which outbound path to use.
E. Automatic load distribution is provided for multiple connections.

3.多項(xiàng)選擇題What are two characteristics of SLB router mode?()

A. The design supports multiple server subnets.
B. An end-user sees the IP address of the real server.
C. SLB routes between the outside and inside subnets.
D. The source or destination MAC address is rewritten, but the IP addresses left alone.
E. SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices.

4.多項(xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()

A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.


5.多項(xiàng)選擇題Which two statements about zoning are correct? ()

A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.

最新試題

Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

題型:?jiǎn)雾?xiàng)選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:?jiǎn)雾?xiàng)選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:?jiǎn)雾?xiàng)選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:?jiǎn)雾?xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()

題型:?jiǎn)雾?xiàng)選擇題

One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()

題型:?jiǎn)雾?xiàng)選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:?jiǎn)雾?xiàng)選擇題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:?jiǎn)雾?xiàng)選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:?jiǎn)雾?xiàng)選擇題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:?jiǎn)雾?xiàng)選擇題