A.Stateful firewall
B.Proxy firewall
C.Packet filtering firewall
D.Stateless firewall
您可能感興趣的試卷
你可能感興趣的試題
A.It is restricted in size to only three segments
B.It requires the use of netBT as the network protocol
C.It requires the implementation of IKE
D.It relies on an underlying Public Key Infrastructure
A.Segment security zones
B.Restrict access to firewalls
C.Use logs and alerts
D.Set connection limits
A.Business needs
B.Risk analysis
C.Security policy
D.Best practices
A.PKCS #7
B.PKCS #8
C.PKCS #10
D.PKCS #12
A.Uplink Fast
B.Port Fast
C.BPDU Guard
D.Root Guard
最新試題
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()
Refer to the exhibit. Which statement is correct based on the show login command output shown?()
Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()
On the basis of the show policy-map type inspect zone-pair session command output provided in theexhibit.What can be determined about this Cisco IOS zone based firewall policy?()
As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
What is the objective of Diffie-Hellman?()
Which statement is true about a Smurf attack?()
Which statement is correct regarding the aaa configurations based on the exhibit provided?()
Which three are distinctions between asymmetric and symmetric algorithms? ()