A. applications security
B. virtual firewall protection
C. security events correlation for proactive response
D. malware, virus, and worm mitigation
您可能感興趣的試卷
你可能感興趣的試題
A. Preparation
B. Planning
C. Design
D. Implementation
E. Operation
F. Optimization
A. provides advanced security such as hardware encryption acceleration
B. provides investment protection through increased modularity
C. comes equipped with at least one 1000-based TX interlace
D. contains integrated wireless access using the 802.11 g/b standard
E. contains integrated web-based management tools for easy configuration and maintenance
A. WebVPN for SSL
B. IPSec
C. AIM
D. Stateful packet inspection
A. IPS
B. VPN Concentrator
C. ACS server
D. PIX firewall
E. CSA MC
F. DDoS Anomaly Guard and Detector
A. available only in autonomous APs
B. available in autonomous and lightweight APs
C. a feature of WDS in autonomous APs
D. a feature of WDS in lightweight APs
E. requires at least one AP and one Wireless LAN Services Module
A. Cisco SDM Security Audit
B. Cisco Security MARS
C. Cisco Security Agent MC
D. Cisco Security IntelliShield
E. CAN
A. a methodology for proactively updating equipment before it reaches the end of its life
B. a methodology for introducing new technologies
C. a methodology for creating a business plan
D. a methodology for determining total cost or ownership
A. integrated security
B. collaborative security system
C. self provisioning
D. Adaptive Threat Defense
E. programmable security ASICs
F. Cisco lOS-based security
A. 5 GHz equipment will not be able to penetrate through walls as well as 2.4 GHZ equipment.
B. 2.4 GHz equipment will not be able to penetrate through walls as well as 5 GHz equipment.
C. Mounting antennas near metal objects will slightly amplify the signal.
D. When determining coverage, you should begin measuring attenuation from the middle of the room.
A. SSID broadcast prevention
B. man-in-the-middle attack protection
C. cost reduction through software upgrades in all existing hardware
D. dynamic key generation
E. RF jamming prevention
最新試題
Which two of these statements best describe fast secure roaming? (Choose two.)()
Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
Which component of Cisco ASDM provides administrators with a complete system overview and device health statistics at a glance?()
At which stage of the Cisco Lifecycle Services approach would you recommend supporting and troubleshooting the system? ()
Which two of these are correct regarding access control lists? (Choose two.) ()
At which stage of the Cisco Lifecycle Services approach should customer education presentations occur? ()
Which of these is a benefit of an integrated security management system? ()
Deploying ISRs with integrated security services can help lower the total cost of ownership. Which of these Cisco ISR Routers features illustrate this point?()