网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which is the main difference between host-based and network-based intrusion prevention?()
A
Host-based IPS can work in promiscuous mode or inline mode.
B
Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C
Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D
Host-based IPS deployment requires less planning than network-based IPS.
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which is the main difference between host-based and network-based intrusion prevention?()A Host-based IPS can work in promiscuous mode or inline mode.B Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D Host-based IPS deployment requires less planning than network-based IPS.” 相关考题
考题
A network IPS provides which of the following?()
A. The layer 3 protocol on which other protocols like TCP and UDP communicate.B. Enables the IPSec protocol on internal workstations.C. Packet-based detection and prevention of network attacks.D. Single mode IP communication for a fiber line between remote sites.
考题
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking
考题
In which two locations in an enterprise network can an IPS sensor be placed?()A、bridging VLANs on two switchesB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunkingE、between a Layer 2 device and a Layer 3 device withtrunking
考题
As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()A、 IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoringB、 IDS will stop malicious traffic from reaching its intended target for certain types of attacks.C、 IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)D、 IPS inspects traffic statefully and needs to see both sides of the connection to function properlyE、 IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
考题
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、core layerB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunking
考题
An IPS sensor with3 sniffing interfaces can be configuredas: ()A、 3 promiscuous sensorsB、 3 inline sensorsC、 1 inline sensor, 1 promiscuous sensorD、 2 inline sensors, 1 promiscuous sensors
考题
Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.
考题
What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()A、 To selectively apply drop actions to specific interfacesB、 To enable IOS to droptraffic for signatures configured with the Drop actionC、 To support load-balancing configurations in which traffic can arrive via multipleinterfaces D、 This is nota valid IOS command
考题
What are three features of the Cisco IOS Firewall feature set?()A、network-based application recognition (NBAR)B、authentication proxyC、stateful packet filteringD、AAA servicesE、proxy serverF、IPS
考题
Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()A、Loopback interfaceB、Command and control interfaceC、Monitoring interfaceD、Management interface
考题
Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()A、signature-basedB、profile-basedC、rule-basedD、protocol analysis-based
考题
What host-based IPS solution provides threat-protection capabilities for server and desktop computing systems?()A、 Cisco IPS AIMB、 Cisco IOS IPSC、 Cisco IPS NMED、 Cisco Security AgentE、 Cisco IDSM-2
考题
In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking
考题
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking
考题
A network IPS provides which of the following?()A、The layer 3 protocol on which other protocols like TCP and UDP communicate.B、Enables the IPSec protocol on internal workstations.C、Packet-based detection and prevention of network attacks.D、Single mode IP communication for a fiber line between remote sites.
考题
Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall
考题
Which of the following is a true statement when promiscuous mode is enabled on an Integrated Virtual Ethernet?()A、 The physical port can be used as part of a Shared Ethernet Adapter (SEA).B、 All physical ports on the Host Ethernet Adapter (HEA) default to promiscuous mode.C、 Multiple logical ports can be assigned to a physical port if that logical port is in promiscuous mode.D、 All physical ports that belong to the same port group will be set to promiscuous mode on the Host Ethernet Adapter (HEA).
考题
单选题A network IPS provides which of the following?()A
The layer 3 protocol on which other protocols like TCP and UDP communicate.B
Enables the IPSec protocol on internal workstations.C
Packet-based detection and prevention of network attacks.D
Single mode IP communication for a fiber line between remote sites.
考题
单选题Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()A
signature-basedB
profile-basedC
rule-basedD
protocol analysis-based
考题
多选题An IPS sensor with3 sniffing interfaces can be configuredas: ()A3 promiscuous sensorsB3 inline sensorsC1 inline sensor, 1 promiscuous sensorD2 inline sensors, 1 promiscuous sensors
考题
单选题What is the main reason for using the "ip ips deny-action ips-interface" IOS command?()A
To selectively apply drop actions to specific interfacesB
To enable IOS to droptraffic for signatures configured with the Drop actionC
To support load-balancing configurations in which traffic can arrive via multipleinterfaces D
This is nota valid IOS command
考题
单选题What host-based IPS solution provides threat-protection capabilities for server and desktop computing systems?()A
Cisco IPS AIMB
Cisco IOS IPSC
Cisco IPS NMED
Cisco Security AgentE
Cisco IDSM-2
考题
多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunking
考题
多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.
考题
单选题Which of the following is a true statement when promiscuous mode is enabled on an Integrated Virtual Ethernet?()A
The physical port can be used as part of a Shared Ethernet Adapter (SEA).B
All physical ports on the Host Ethernet Adapter (HEA) default to promiscuous mode.C
Multiple logical ports can be assigned to a physical port if that logical port is in promiscuous mode.D
All physical ports that belong to the same port group will be set to promiscuous mode on the Host Ethernet Adapter (HEA).
考题
单选题Which statement about IDS/IPS design is correct?()A
An IPS should be deployed if the security policy does not support the denial of traffic.B
An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C
An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D
Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
考题
单选题One of the differences between a two-stroke engine and a four-stroke engine is,()A
a two-stroke engine can’t work without cylindersB
a two-stroke engine can’t work without pistonsC
a two-stroke engine can’t work without crankshaftsD
a two-stroke engine can’t work without a blower
热门标签
最新试卷