网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?()

A.MARS

B.NAC

C.VPN

D.IPS


参考答案

更多 “ Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?() A.MARSB.NACC.VPND.IPS ” 相关考题
考题 The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

考题 The cisco ironport portfolio performs which service?() A.reduces the downtime that is asassocoated with spam,viruses,and blended threats that are delivered via emailB.determines if A user or device is authorized to access A switch portC.defends the penmeter from malicious users and unauthorized trafficD.provides A secure communication path through the internet

考题 Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

考题 Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complex B.unique C.catchy D.long

考题 What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

考题 Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

考题 Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

考题 Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?()A、IPsec site-to-site VPNB、Cisco AutoSecureC、Cisco IOS FirewallD、IPS

考题 Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()A、Cisco Firewall Services Module (FWSM)B、Cisco Secure Access Control Server (ACS)C、Cisco Private Internet Exchange (PIX) FirewallD、Cisco Internetwork Operating System (IOS) Firewall

考题 The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

考题 Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A、 Cisco Secure Desktop (CSD)B、 NAC Appliance Agent (NAA)C、 Cisco SecurityAgent (CSA)D、 SSLVPN Client (SVC)E、 Cisco TrustAgent (CTA)

考题 Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A、 Cisco Trust AgentB、 Cisco Self-Defending NetworkC、 Cisco Secure Access ControlD、 Cisco Network Admission Control

考题 The cisco ironport portfolio performs which service?()A、reduces the downtime that is asassocoated with spam,viruses,and blended threats that are delivered via emailB、defends thepenmeter from malicious users and unauthorized trafficC、providesA secure communication path through the internetD、determines if a user or device is authorized to access a switch port

考题 The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 Which online Cisco resource provides PPDIOO and Lifecycle Services methodology?()A、 Cisco Product AdvisorB、 Steps to Success PortalC、 Secure Business AdvisorD、 Cisco Solution Designer

考题 Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()A、MARSB、NACC、VPND、IPS

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 Which of the following would be used to monitor unauthorized access to data files?()A、Performance Log and AlertsB、Event ViewerC、Security Configuration and AnalysisD、IP Security Monitor

考题 多选题The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()AAttacks are prevented by utilizing the port-security feature.BAn end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.CConfiguring an interface with the switchport mode dynamic command will prevent VLAN  hopping.DAn end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.EConfiguring an interface with the switchport mode access command will prevent VLAN  hopping.

考题 单选题Which online Cisco resource provides PPDIOO and Lifecycle Services methodology?()A  Cisco Product AdvisorB  Steps to Success PortalC  Secure Business AdvisorD  Cisco Solution Designer

考题 单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A  MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B  Port scanners are the most effective defense against dynamic ARP inspection.C  MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D  Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E  DHCP snooping sends unauthorized replies to DHCP queries.F  ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G  None of the other alternatives apply.

考题 单选题Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A  Cisco Secure Desktop (CSD)B  NAC Appliance Agent (NAA)C  Cisco SecurityAgent (CSA)D  SSLVPN Client (SVC)E  Cisco TrustAgent (CTA)

考题 单选题Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A  Cisco Trust AgentB  Cisco Self-Defending NetworkC  Cisco Secure Access ControlD  Cisco Network Admission Control

考题 单选题Why would a network administrator configure port security on a switch()。A to prevent unauthorized Telnet access to a switch portB to limit the number of Layer 2 broadcasts on a particular switch portC to prevent unauthorized hosts from accessing the LAND to protect the IP and MAC address of the switch and associated portsE to block unauthorized access to the switch management interfaces over common TCP ports

考题 单选题Which Cisco product family can simultaneously implement firewall, VPN, content security, network access control, virtualization, anD content filtering?()A catalyst switchesB adaptive security appliancesC intrusion prevention systemsD protect link gateway

考题 单选题Why would a network administrator configure port security on a switch?()A To prevent unauthorized Telnet access to a switch port.B To limit the number of Layer 2 broadcasts on a particular switch port.C To prevent unauthorized hosts from accessing the LAN.D To protect the IP and MAC address of the switch and associated ports.E To block unauthorized access to the switch management interfaces over common TCP ports.