A. intrusion protection
B. identity
C. secure connectivity
D. security management
您可能感興趣的試卷
你可能感興趣的試題
A. Easy VPN
B. IPsec GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
A. 1
B. 2
C. 3
D. 4
A. full mesh
B. peer-to-peer
C. partial mesh
D. hub and spoke
A. IGRP
B. RIP
C. RIPv2
D. OSPF
A. passively listens to network traffic
B. is an active device in the traffic path
C. has a permissive interface that is used to monitor networks
D. traffic arrives on one IPS interface and exits on another
最新試題
What are two characteristics of OER? ()
Which two of these correctly describe asymmetric routing and firewalls? ()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
Which two statements about zoning are correct?()
Which two statements about Cisco Security Management Suite are correct? ()
What are two characteristics of the SLB One-arm mode? ()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()