A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
您可能感興趣的試卷
你可能感興趣的試題
A. The access layer is the first oversubscription point in a data center design.
B. When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
C. When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
D. When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
E. The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.
A. 50
B. 100
C. 150
D. 200
E. 250
A. edge
B. central
C. Layer 2
D. Layer 3
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. The iSCSI stack supports block-level storage for remote devices.
E. The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
A. IVR
B. VoQ
C. FSPF
D. VSANs
E. SANTap
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to 100 km before needing extenders
A. It operates much like TCP.
B. Flow control is only provided by QoS.
C. It must be implemented in an arbitrated loop.
D. Communication methods are similar to those of an Ethernet bus.
E. N_Port to N_Port connections use logical node connection points.
A. Virtual Gateway
B. Real-IP Gateway
C. NAT Gateway
D. Central Gateway
最新試題
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which statement about data center access layer design modes is correct?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Which three of the following descriptions are true about the firewall modes? ()
Which two of these correctly describe Fibre Channel?()
What are two characteristics of GSS? ()
What is the traditional mode for a firewall?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
What are two characteristics of OER? ()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()