网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()
- A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
- B、 automatic reconfiguration s of the security devices based on current security threats
- C、 containment and control of security threats
- D、 application security
- E、 anti-x defense F- virtual firewall
参考答案
更多 “What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksB、 automatic reconfiguration s of the security devices based on current security threatsC、 containment and control of security threatsD、 application securityE、 anti-x defense F- virtual firewall” 相关考题
考题
Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)
A. MIME patternB. file extensionC. IP spoofingD. POP3E. protocol command
考题
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
A. The ability to detect and prevent malicious traffic.B. The ability to associate security breaches with a specific user.C. Converged management of network and security events, network flow data, and identity information.D. Consistent device management across administrative realms.
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)
A. Mark permitted traffic for firewall user authentication.B. Mark permitted traffic for SCREEN options.C. Associate permitted traffic with an IPsec tunnel.D. Associate permitted traffic with a NAT rule.E. Mark permitted traffic for IDP processing.
考题
What are three characteristics of a service tunnel? ()(Choose three.)
A. It is bidirectional.B. It carries optimized traffic.C. It can carry traffic using UDP.D. It is formed only within a community
考题
Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。
A.to control vty access into a routerB.to control broadcast traffic through a routerC.to filter traffic as it passes through a routerD.to filter traffic that originates from the routerE.to replace passwords as a line of defense against security incursions
考题
Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
考题
What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()A、 provides advanced security such as hardware encryption accelerationB、 provides investment protection through increased modularityC、 comes equipped with at least one 1000-based TX interlaceD、 contains integrated wireless access using the 802.11 g/b standardE、 contains integrated web-based management tools for easy configuration and maintenance
考题
List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()A、 integrated securityB、 collaborative security systemC、 self provisioningD、 Adaptive Threat DefenseE、 programmable security ASICsF、 Cisco lOS-based security
考题
What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions
考题
Which three packet interception methods are configurable in WX devices?() (Choose three.)A、OSPFB、WCCPC、policy based routingD、route injection using RIPv1E、route injection using RIPv2
考题
Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()A、 onboard VPN acceleratorB、 events correlation and proactive responseC、 high-performance AIM VPN modulesD、 virtual firewallE、 Cisco lOS Firewall and lOS IPSF、 transparent firewall
考题
Which Cisco IOS traffic-shaping mechanism statement is true? ()A、class-based policing is configured using the Modular QoS command-line (MQC)B、only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN linksC、Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configurationD、both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic
考题
Which IOS QoS mechanism is used strictly to rate limit traffic destinedto the router itself?()A、 Class-Based PolicingB、 Control Plane PolicingC、 Dual-Rate PolicierD、 Single-Rate PolicierE、 Class-BasedTraffic Shaper
考题
Which three advanced permit actions within security policies are valid?() (Choose three.)A、Mark permitted traffic for firewall user authentication.B、Mark permitted traffic for SCREEN options.C、Associate permitted traffic with an IPsec tunnel.D、Associate permitted traffic with a NAT rule.E、Mark permitted traffic for IDP processing.
考题
What are three characteristics of a service tunnel? ()(Choose three.)A、It is bidirectional.B、It carries optimized traffic.C、It can carry traffic using UDP.D、It is formed only within a community
考题
Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)A、MIME patternB、file extensionC、IP spoofingD、POP3E、protocol command
考题
多选题What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()Ausing QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksBautomatic reconfiguration s of the security devices based on current security threatsCcontainment and control of security threatsDapplication securityEanti-x defense F- virtual firewall
考题
多选题What are three characteristics of a service tunnel? ()(Choose three.)AIt is bidirectional.BIt carries optimized traffic.CIt can carry traffic using UDP.DIt is formed only within a community
考题
多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
考题
多选题List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()Aintegrated securityBcollaborative security systemCself provisioningDAdaptive Threat DefenseEprogrammable security ASICsFCisco lOS-based security
考题
多选题Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()Aonboard VPN acceleratorBevents correlation and proactive responseChigh-performance AIM VPN modulesDvirtual firewallECisco lOS Firewall and lOS IPSFtransparent firewall
考题
多选题Content filtering enables traffic to be permitted or blocked based on inspection of which three types of content?()(Choose three.)AMIME patternBfile extensionCIP spoofingDPOP3Eprotocol command
考题
多选题What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()Aprovides advanced security such as hardware encryption accelerationBprovides investment protection through increased modularityCcomes equipped with at least one 1000-based TX interlaceDcontains integrated wireless access using the 802.11 g/b standardEcontains integrated web-based management tools for easy configuration and maintenance
考题
单选题Which IOS QoS mechanism is used strictly to rate limit traffic destinedto the router itself?()A
Class-Based PolicingB
Control Plane PolicingC
Dual-Rate PolicierD
Single-Rate PolicierE
Class-BasedTraffic Shaper
考题
多选题What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()AThe ability to detect and prevent malicious traffic.BThe ability to associate security breaches with a specific user.CConverged management of network and security events, network flow data, and identity information.DConsistent device management across administrative realms.
考题
多选题Which three packet interception methods are configurable in WX devices?() (Choose three.)AOSPFBWCCPCpolicy based routingDroute injection using RIPv1Eroute injection using RIPv2
热门标签
最新试卷