A. 3 promiscuous sensors
B. 3 inline sensors
C. 1 inline sensor, 1 promiscuous sensor
D. 2 inline sensors, 1 promiscuous sensors
您可能感興趣的試卷
你可能感興趣的試題
A. nat (inside) 0 209.165.202.150 255.255.255.255
B. access-list no-nat permit ip host209.165.202.150 anynat(inside) 0 access-list no-nat
C. static(inside,outside) 209.165.202.150 209.165.202.150 netmask 255.255.255.255
D. no nat-control
E. nat (inside) 1 209.165.202.150 255.255.255.255
A. nat
B. nonat-control
C. access-list
D. none of the above
A. All traffic passing through theappliance
B. Traffic from internal networks on a per IP basis
C. Based on protocol only.
D. On a per-context basis only.
A. show asp drop
B. show counters drop
C. show security-policy
D. show policy-map
A. http-map, tcp-map, class-map
B. class-map, tcp-map, policy-map
C. class-map, policy-map, service-map
D. class-map, service-policy, policy-map
最新試題
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()
When implementing internet standards you are required to follow RFC’s processes and procedures based onwhat RFC?()
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
Choose the most correct statements about SMTP/ESMTP. ()
In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()
Which of the following is an example of a security technology that could be enabled by Netflow?()
What technologies are included inAnti-X? ()
What is true about SYN cookies?()
What Cisco Switch feature best protects against CAM table overflow attacks?()
What Cisco technology protects against Spanning-Tree Protocol manipulation?()