A. Content and URL filtering
B. Intrusion Prevention
C. VPN
D. Virus and Phishing protection
E. Content Caching
您可能感興趣的試卷
你可能感興趣的試題
A. Preventing browsers from opening network sockets inlistening state.
B. Preventingbuffer overflows.
C. Preventingusers from entering unencrypted passwords
D. Preventing browsers from acting as client to webservers.
A. Open mail relays are often used for spamming.
B. ESMTP does NOT provide more security features than SMTP
C. SMTPdoes provide authenticated email sending."
D. Worms often spread via SMTP.
A. No vulnerable applications or operating systems
B. No viruses or worms
C. Appropriate security applications and patch levels
D. Current IPS signatures
E. Cisco Security Agent
A. pre-sharedkey
B. secure hash
C. SSL
D. RSA signature
A. group 3
B. group 1
C. group 5
D. group 7
最新試題
When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()
Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()
Which is a benefit of implementing RFC 2827?()
Which of these is the best way to provide sender non-repudiation?()
Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()
What group in Cisco IOS does 1536-bit Diffie-Hellman prime modulus equivalent too?()
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
ASDM on the ASA platform is executed as:()
Which one of the following is NOT a valid RADIUS packet type?()