网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
多选题
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()
A
security contexts
B
- transparent firewall
C
WebVPN
D
Active/Active failover
E
low latency queuing
F
AIP-SSM intrusion prevention
参考答案
参考解析
解析:
暂无解析
更多 “多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention” 相关考题
考题
( 33 )如果一台 Cisco PIX 525 防火墙有如下配置:Pix525(config)#nameif ethernet0 P1 security100Pix525(config)#nameif ethernet1 P2 security0Pix525(config)#nameif ethernet2 P3 security50那么常用的端口连接方案是A )端口 P1 作为外部接口, P2 连接 DMZ , P3 作为内部接口B )端口 P1 作为内部接口, P2 连接 DMZ , P3 作为外部接口C )端口 P1 作为外部接口, P2 作为内部接口, P3 连接 DMZD )端口 P1 作为内部接口, P2 作为外部接口, P3 连接 DMZ
考题
如果一台 Csico PIX525 防火墙有如下配置Pix525(config)#nameeif ethernet0 outside security VAL1Pix525(config)#nameeif ethernet1 inside security VAL2Pix525(config)#nameeif ethernet2 DMZ security VAL3那么通常 VAL1 、 VAL2 、 VAL3 的取值分别是A)0 、 50 、 100B)0 、 100 、 50C)100 、 0 、 50D)100 、 50 、 0
考题
Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()
A. set content-filtering profilepermit-command block-mimeB. set content-filtering profileblock-mimeC. set content-filtering block-content-typeblock-mimeD. set content-filtering notifications block-mime
考题
The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()A、 IPSB、 VPN ConcentratorC、 ACS serverD、 PIX firewallE、 CSA MCF、 DDoS Anomaly Guard and Detector
考题
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention
考题
When installing processors with mixed stepping levels in a server, which of the following guidelines must be followed? ()A、 The processors must have different frequencies set to operate.B、 The processor with the highest feature set must be the bootstrap processor.C、 The processors must have different cache sizes set to operate.D、 The processors must have the same cache size set.E、 The processor with the lowest feature set must be the bootstrap processor.
考题
You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()A、Disable the values for the Menu Module Roles property. B、Set the Use Security value in the form module Property Palette to 'True'. C、Set the Use Security value in the form module Property Palette to 'False'. D、Set the Use Security value in the menu module Property Palette to 'True'. E、Set the Use Security value in the menu module Property Palette to 'False'.
考题
The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A、 show asp dropB、 show counters dropC、 show security-policyD、 show policy-map
考题
Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft? ()A、 WebVPN for SSLB、 IPSecC、 AIMD、 Stateful packet inspection
考题
When configuring a Cisco Adaptive Security Appliance in multiple context mode, which of the follow capabilities are supported?()A、 Multicastis supportedB、 Dynamic routing protocols are supportedC、 VPN configurations are supportedD、 Static routes are supported
考题
Which Cisco product is a hardware component that supports content filtering and other gateway security functions for the Catalyst 6500 Series?()A、Cisco Private Internet Exchange (PIX) FirewallB、Cisco VPN/Security Management Solution (VMS)C、Cisco Internetwork Operating System (IOS) FirewallD、Cisco Firewall Services Module (FWSM)
考题
Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A、 Security ControlsB、 Database AccessC、 Set Security ProfileD、 Authorize Group Reassignment
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A、set content-filtering profile permit-command block-mimeB、set content-filtering profile block-mimeC、set content-filtering block-content-type block-mimeD、set content-filtering notifications block-mime
考题
You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.
考题
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.
考题
单选题()shall set security levels and provide guidance for protection from security incidents.A
The Contracting GovernmentsB
The Port AuthoritiesC
The MasterD
The Company Security
考题
单选题Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()A
Cisco IOS routerB
Cisco PIX 500 series security applianceC
Cisco 4200 series IPS applianceD
Cisco ASA 5500 series security appliance
考题
单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A
The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B
The best option is to set up a content filtering feature to comply with the Company.com security policy.C
The best option is to create a transport rule to comply with the Company.com security policy.D
The best option is to set up a sender reputation feature to comply with the Company.com security policy.
考题
多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector
考题
单选题如果一台Cisco PIX 525防火墙有如下配置:Pix525(config)#nameif ethemet0 P 1 security 100Pix525(config)#nameif ethemet1 P2 security0Pix525(config)#nameif ethemet2 P3 security50那么常用的端口连接方案是( )。A
端口P1作为外部接口,P2连接DMZ,P3作为内部接口B
端口P1作为内部接口,P2连接DMZ,P3作为外部接口C
端口P1作为外部接口,P2作为内部接口,P3连接DMZD
端口P1作为内部接口,P2作为外部接口,P3连接DMZ
考题
多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention
考题
单选题Which of these statements regarding Cisco’s WebVPN support is correct?()A
Cisco ISR Routers with the Enhanced Security Bundles support WebVPN.B
Cisco security appliances act as a proxy between the end user and the target web server.C
Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN.D
Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.
考题
单选题Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft? ()A
WebVPN for SSLB
IPSecC
AIMD
Stateful packet inspection
考题
单选题The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A
show asp dropB
show counters dropC
show security-policyD
show policy-map
考题
单选题Which deployed VoWLAN client security option is recommended by Cisco?()A
Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB
Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC
Layer 3 with Layer 3 Security set to VPN Pass-ThroughD
Layer 2 with Layer 2 Security set to 802.1X
考题
单选题Which Cisco product is a hardware component that supports content filtering and other gateway security functions for the Catalyst 6500 Series?()A
Cisco Firewall Services Module (FWSM)B
Cisco Private Internet Exchange (PIX) FirewallC
Cisco VPN/Security Management Solution (VMS)D
Cisco Internetwork Operating System (IOS) Firewall
考题
多选题When installing processors with mixed stepping levels in a server, which of the following guidelines must be followed? ()AThe processors must have different frequencies set to operate.BThe processor with the highest feature set must be the bootstrap processor.CThe processors must have different cache sizes set to operate.DThe processors must have the same cache size set.EThe processor with the lowest feature set must be the bootstrap processor.
热门标签
最新试卷