网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
An IPS sensor with3 sniffing interfaces can be configuredas:  ()
A

3 promiscuous sensors

B

3 inline sensors

C

1 inline sensor, 1 promiscuous sensor

D

2 inline sensors, 1 promiscuous sensors


参考答案

参考解析
解析: 暂无解析
更多 “多选题An IPS sensor with3 sniffing interfaces can be configuredas:  ()A3 promiscuous sensorsB3 inline sensorsC1 inline sensor, 1 promiscuous sensorD2 inline sensors, 1 promiscuous sensors” 相关考题
考题 Top N analysis requires () and (). A. the use of rowidB. a GROUP BY clauseC. an ORDER BY clauseD. only an inline viewE. an inline view and an outer query

考题 Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" >"Sensors" >"Sensor Event Policies" >[rule name] to accomplish this?()A. IgnoreB. Replace users roleC. Terminate user sessionD. Disable user account

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

考题 Promiscuous mode混杂模式

考题 As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()A、 IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoringB、 IDS will stop malicious traffic from reaching its intended target for certain types of attacks.C、 IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)D、 IPS inspects traffic statefully and needs to see both sides of the connection to function properlyE、 IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、core layerB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunking

考题 An IPS sensor with3 sniffing interfaces can be configuredas:  ()A、 3 promiscuous sensorsB、 3 inline sensorsC、 1 inline sensor, 1 promiscuous sensorD、 2 inline sensors, 1 promiscuous sensors

考题 Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

考题 Why does L4TM require T1 to be in promiscuous mode?() A、to process traffic that is not intended for its MAC addressB、to transmit TCP reset packetsC、to bind with other promiscuous mode portsD、to receive Ethernet broadcasts

考题 Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.

考题 内联函数的正确定义是()A、inline int small();int small(){/*……*/}B、int small();inline int small(){/*……*/}C、int inline small();int small(){/*……*/}D、int small();int inline small(){/*……*/}

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

考题 Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

考题 Which of the following can be installed to avoid brown outs?()A、A larger electrical breakerB、An inline fuse boxC、A UPSD、Multiple power supplies

考题 Your corporate security policy requires that a user performing attacks must have limited network access and activities until an administrator can investigate.In the admin GUI, which sensor event policy action must you configure in "Configuration" "Sensors" "Sensor Event Policies" [rule name] to accomplish this?()A、IgnoreB、Replace users roleC、Terminate user sessionD、Disable user account

考题 Top N analysis requires () and ().A、the use of rowidB、a GROUP BY clauseC、an ORDER BY clauseD、only an inline viewE、an inline view and an outer query

考题 Which of the following is a true statement when promiscuous mode is enabled on an Integrated Virtual Ethernet?()A、 The physical port can be used as part of a Shared Ethernet Adapter (SEA).B、 All physical ports on the Host Ethernet Adapter (HEA) default to promiscuous mode.C、 Multiple logical ports can be assigned to a physical port if that logical port is in promiscuous mode.D、 All physical ports that belong to the same port group will be set to promiscuous mode on the Host Ethernet Adapter (HEA).

考题 多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()Ahas a permissive interface that is used to monitor networksBis an active device in the traffic pathCpassively listens to network trafficDhas a promiscuous interface that is used to monitor the network

考题 多选题An IPS sensor with3 sniffing interfaces can be configuredas:  ()A3 promiscuous sensorsB3 inline sensorsC1 inline sensor, 1 promiscuous sensorD2 inline sensors, 1 promiscuous sensors

考题 多选题Which two of these are characteristics of an IDS sensor?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IDS interface and exits on anotherEhas a promiscuous interface that is used to monitor the network

考题 多选题As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()AIDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoringBIDS will stop malicious traffic from reaching its intended target for certain types of attacks.CIPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)DIPS inspects traffic statefully and needs to see both sides of the connection to function properlyEIDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information

考题 多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking

考题 多选题Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()ALoopback interfaceBCommand and control interfaceCMonitoring interfaceDManagement interface

考题 名词解释题Promiscuous mode混杂模式

考题 多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunking

考题 单选题内联函数的正确定义是()A inline int small();int small(){/*……*/}B int small();inline int small(){/*……*/}C int inline small();int small(){/*……*/}D int small();int inline small(){/*……*/}

考题 多选题Top N analysis requires () and ().Athe use of rowidBa GROUP BY clauseCan ORDER BY clauseDonly an inline viewEan inline view and an outer query

考题 单选题Why does L4TM require T1 to be in promiscuous mode?()A to process traffic that is not intended for its MAC addressB to transmit TCP reset packetsC to bind with other promiscuous mode portsD to receive Ethernet broadcasts