A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
您可能感興趣的試卷
你可能感興趣的試題
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
A. intrusion protection
B. identity
C. secure connectivity
D. security management
A. PortFast
B. UplinkFast
C. loop guard
D. root guard
E. BPDU guard
F. BackboneFast
最新試題
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
Which three of these are important when determining NAS Server scaling? ()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()