A. Content and URL filtering
B. Intrusion Prevention
C. VPN
D. Virus and Phishing protection
E. Content Caching
您可能感興趣的試卷
你可能感興趣的試題
A. Preventing browsers from opening network sockets inlistening state.
B. Preventingbuffer overflows.
C. Preventingusers from entering unencrypted passwords
D. Preventing browsers from acting as client to webservers.
A. Open mail relays are often used for spamming.
B. ESMTP does NOT provide more security features than SMTP
C. SMTPdoes provide authenticated email sending."
D. Worms often spread via SMTP.
A. No vulnerable applications or operating systems
B. No viruses or worms
C. Appropriate security applications and patch levels
D. Current IPS signatures
E. Cisco Security Agent
A. pre-sharedkey
B. secure hash
C. SSL
D. RSA signature
A. group 3
B. group 1
C. group 5
D. group 7
最新試題
Which statements are true concerning NAT? ()
In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()
Choose the most correct statements about SMTP/ESMTP. ()
What Cisco Switch feature best protects against CAM table overflow attacks?()
What group in Cisco IOS does 1536-bit Diffie-Hellman prime modulus equivalent too?()
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()
Select the two correctstatements from the list below that describe DES and 3DES: ()
Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()
Which of the following is true about RADIUSV end or Specific Attribute? ()
Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()