A. No vulnerable applications or operating systems
B. No viruses or worms
C. Appropriate security applications and patch levels
D. Current IPS signatures
E. Cisco Security Agent
您可能感興趣的試卷
你可能感興趣的試題
A. pre-sharedkey
B. secure hash
C. SSL
D. RSA signature
A. group 3
B. group 1
C. group 5
D. group 7
A. 4 bytes for both
B. 4 bytes, and 8 bytes respectively
C. 8 bytes for both
D. 24 bytes for both
A. Blocking cipher andnon-blocking cipher
B. CBC cipher and EBC cipher
C. Block cipher and Stream cipher
D. Blocker cipher and Streamer cipher
E. 3DES cipher and AES cipher
A. SSL Handshake Protocol
B. SSLAlert Protocol
C. SSL Record Protocol
D. SSL Change CipherSpec Protocol
最新試題
Which is a benefit of implementing RFC 2827?()
In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
ASDM on the ASA platform is executed as:()
Select the two correctstatements from the list below that describe DES and 3DES: ()
What technologies are included inAnti-X? ()
TACACS+ authentication uses whichthree packet types? ()
Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()
Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()
What Cisco technology protects against Spanning-Tree Protocol manipulation?()