A. host security
B. perimeter security
C. security monitoring
D. policy management
您可能感興趣的試卷
你可能感興趣的試題
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A. 3
B. 6
C. 7
D. 8
The Cisco IOS SLB feature is a Cisco IOS-based solution that provides server load balancing.
This feature allows you to define a virtual server that represents a cluster of real servers, known asa server farm.
When a client initiates a connection to the virtual server, the IOS SLB load balances theconnection to a chosen real server, depending on the configured load balance algorithm orpredictor.
Which three implementation modes may be used to deploy SLB? ()
A. Router mode
B. One-arm mode
C. Three-arm mode
D. Bridge mode inline
A. 4
B. 6
C. 7
D. 10
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
最新試題
Which three of the following descriptions are true about the firewall modes? ()
What is the recommended radius of a cell for a voice-ready wireless network?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Which statement about Fibre Channel communications is correct?()
What are two characteristics of GSS? ()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
In which two locations in an enterprise network can an IPS sensor be placed? ()
Which two statements about an interface configured with the asr-group command are correct? ()