多項選擇題The RiskRating for an IPS signatureis calculatedusing four primary components. Select the four components below.   ()

A. SignatureFidelity Rating
B. Alert Severity Rating
C. Exploit Probability Rating
D. Target Value Rating
E. Attack Relevancy Rating


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題An IPS sensor with3 sniffing interfaces can be configuredas:  ()

A. 3 promiscuous sensors
B. 3 inline sensors
C. 1 inline sensor, 1 promiscuous sensor
D. 2 inline sensors, 1 promiscuous sensors

2.多項選擇題Given the topology of a server (with IP 209.165.202.150) protected behind the inside interface of an ASA/PIX,and the Internet on the outside interface. Users on the Internet need to access the server at any time, but the firewall administrator does not want to NAT the address of the server - since itis currentlya public address. Which of the following commands can be used to accomplish this? ()

A. nat (inside) 0 209.165.202.150 255.255.255.255
B. access-list no-nat permit ip host209.165.202.150 anynat(inside) 0 access-list no-nat
C. static(inside,outside) 209.165.202.150 209.165.202.150 netmask 255.255.255.255
D. no nat-control
E. nat (inside) 1 209.165.202.150 255.255.255.255

4.單項選擇題Select thebest answer to this qestion. ASA/PIX Active/Active failover can be used toload-balance:()

A. All traffic passing through theappliance
B. Traffic from internal networks on a per IP basis
C. Based on protocol only.
D. On a per-context basis only.

最新試題

What group in Cisco IOS does 1536-bit Diffie-Hellman prime modulus equivalent too?()

題型:單項選擇題

Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()

題型:單項選擇題

Cisco Clean Access ensures that computers connecting to your network have which of the following?()

題型:單項選擇題

When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()

題型:單項選擇題

What is true about SYN cookies?()

題型:單項選擇題

Which of the following statements that describe Diffie Hellman Key exchange are correct? ()

題型:多項選擇題

Choose the most correct statements about SMTP/ESMTP. ()

題型:多項選擇題

Which one of the following is NOT a valid RADIUS packet type?()

題型:單項選擇題

What Cisco Switch feature best protects against CAM table overflow attacks?()

題型:單項選擇題

In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()

題型:單項選擇題