A. Content and URL filtering
B. Intrusion Prevention
C. VPN
D. Virus and Phishing protection
E. Content Caching
您可能感興趣的試卷
你可能感興趣的試題
A. Preventing browsers from opening network sockets inlistening state.
B. Preventingbuffer overflows.
C. Preventingusers from entering unencrypted passwords
D. Preventing browsers from acting as client to webservers.
A. Open mail relays are often used for spamming.
B. ESMTP does NOT provide more security features than SMTP
C. SMTPdoes provide authenticated email sending."
D. Worms often spread via SMTP.
A. No vulnerable applications or operating systems
B. No viruses or worms
C. Appropriate security applications and patch levels
D. Current IPS signatures
E. Cisco Security Agent
A. pre-sharedkey
B. secure hash
C. SSL
D. RSA signature
A. group 3
B. group 1
C. group 5
D. group 7
最新試題
Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()
When configuring a multipoint GRE (mGRE) tunnel interface, which one of the following is NOT a valid configuration option:()
Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()
Since HTTP is one of the most common protocols used in the internet, what should be done at a firewall level to ensure thatthe protocol is being used correctly? ()
Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()
What are the header sizes for point-to-point and multi-point GRE(also known asmGRE) with tunnel key?()
Which one of the following is NOT a valid RADIUS packet type?()
What Cisco Switch feature best protects against CAM table overflow attacks?()
Choose the most correct statements about SMTP/ESMTP. ()