A.scanning streaming media for malware
B.scanning multiple downloads at the same time
C.passing pieces of a download to the client while the download is being scanned
D.passing scanned pieces of the file between two different malware-scanning engines
您可能感興趣的試卷
你可能感興趣的試題
A.a list of proxy servers that are to be bypassed
B.a list of clients and destinations that will bypass the proxy in transparent mode
C.a list of clients and destinations that will bypass the proxy in explicit forward mode
D.a list of user agents exempt from authentication
A.client reports will display authenticated usernames
B.client reports will display both the username and IP address of the clients
C.client reports are not affected by authentication
D.client reports will display the IP address of the authentication server
最新試題
Match the interface with the use on the WSA.
Match the log file with its role in troubleshooting.
Which of these is not an action that is associated with HTTPS decryption policies?()
Which of these can not be used in defining policies?()
Bandwidth limits cannot be:()
Which of these is not used as a monitoring tool?()
Why does L4TM require T1 to be in promiscuous mode?()
Put the following features in the order they are applied.
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()
If you want to reset your configuration back to the factory defaults but keep your logs and reports,Which CLI command should you use?()