A. 3 promiscuous sensors
B. 3 inline sensors
C. 1 inline sensor, 1 promiscuous sensor
D. 2 inline sensors, 1 promiscuous sensors
您可能感興趣的試卷
你可能感興趣的試題
A. nat (inside) 0 209.165.202.150 255.255.255.255
B. access-list no-nat permit ip host209.165.202.150 anynat(inside) 0 access-list no-nat
C. static(inside,outside) 209.165.202.150 209.165.202.150 netmask 255.255.255.255
D. no nat-control
E. nat (inside) 1 209.165.202.150 255.255.255.255
A. nat
B. nonat-control
C. access-list
D. none of the above
A. All traffic passing through theappliance
B. Traffic from internal networks on a per IP basis
C. Based on protocol only.
D. On a per-context basis only.
A. show asp drop
B. show counters drop
C. show security-policy
D. show policy-map
A. http-map, tcp-map, class-map
B. class-map, tcp-map, policy-map
C. class-map, policy-map, service-map
D. class-map, service-policy, policy-map
最新試題
What technologies are included inAnti-X? ()
Which statements are true concerning NAT? ()
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
With PGP, which of the following entity signs a users’s public key?()
Choose the most correct statements about SMTP/ESMTP. ()
ASDM on the ASA platform is executed as:()
In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
What is true about SYN cookies?()
Which of the following statements that describe Diffie Hellman Key exchange are correct? ()