單項(xiàng)選擇題Cisco Clean Access ensures that computers connecting to your network have which of the following?()

A. No vulnerable applications or operating systems
B. No viruses or worms
C. Appropriate security applications and patch levels
D. Current IPS signatures
E. Cisco Security Agent


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Which of these is the best way to provide sender non-repudiation?()

A. pre-sharedkey
B. secure hash
C. SSL
D. RSA signature

2.單項(xiàng)選擇題What group in Cisco IOS does 1536-bit Diffie-Hellman prime modulus equivalent too?()

A. group 3
B. group 1
C. group 5
D. group 7

3.單項(xiàng)選擇題What are the header sizes for point-to-point and multi-point GRE(also known asmGRE) with tunnel key?()

A. 4 bytes for both
B. 4 bytes, and 8 bytes respectively
C. 8 bytes for both
D. 24 bytes for both

4.單項(xiàng)選擇題Which ones are the two type of ciphers?()

A. Blocking cipher andnon-blocking cipher
B. CBC cipher and EBC cipher
C. Block cipher and Stream cipher
D. Blocker cipher and Streamer cipher
E. 3DES cipher and AES cipher

最新試題

Which is a benefit of implementing RFC 2827?()

題型:?jiǎn)雾?xiàng)選擇題

In an L2TP voluntary tunneling scenario, the VPDN tunnel is terminated between:()

題型:?jiǎn)雾?xiàng)選擇題

Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

題型:?jiǎn)雾?xiàng)選擇題

ASDM on the ASA platform is executed as:()

題型:?jiǎn)雾?xiàng)選擇題

Select the two correctstatements from the list below that describe DES and 3DES: ()

題型:多項(xiàng)選擇題

What technologies are included inAnti-X? ()

題型:多項(xiàng)選擇題

TACACS+ authentication uses whichthree packet types? ()

題型:多項(xiàng)選擇題

Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()

題型:多項(xiàng)選擇題

Which SSL protocol takes anapplication message tobe transmitted, fragments the datainto manageable blocks, optionally compresses the data, applies a MAC, encrypts, adds a header, and transmits the resulting unit ina TCPsegment?()

題型:?jiǎn)雾?xiàng)選擇題

What Cisco technology protects against Spanning-Tree Protocol manipulation?()

題型:?jiǎn)雾?xiàng)選擇題