A. applications security
B. virtual firewall protection
C. security events correlation for proactive response
D. malware, virus, and worm mitigation
您可能感興趣的試卷
你可能感興趣的試題
A. Cisco ISR Routers with the Enhanced Security Bundles support WebVPN.
B. Cisco security appliances act as a proxy between the end user and the target web server.
C. Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN.
D. Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.
A. Cisco Aironet 1000 Series
B. Cisco Aironet 1100 Series
C. Cisco Aironet 1200 Series
D. Cisco Aironet 1300 Series
E. Cisco Aironet 1400 Series
A. It provides configuration, monitoring, and troubleshooting capabilities across a wide range of security products.
B. It integrates security device management products and collects events on an "as needed" basis to reduce management overhead.
C. It integrates security management capabilities into the router or switch.
D. It provides a single point of contact for all security configuration tasks thereby enhancing the return on investment.
E. It leverages existing network management systems such as HP OpenView to lower the cost of implementation.
A. IPS
B. VPN Concentrator
C. ACS server
D. PIX firewall
E. CSA MC
F. DDoS Anomaly Guard and Detector
A. available only in autonomous APs
B. available in autonomous and lightweight APs
C. a feature of WDS in autonomous APs
D. a feature of WDS in lightweight APs
E. requires at least one AP and one Wireless LAN Services Module
A. Preparation
B. Planning
C. Design
D. Implementation
E. Operation
F. Optimization
A. SSID broadcast prevention
B. Improved mutual authentication
C. Improved encryption through AES
D. Improved protection against sniffing initialization vectors
E. RF jamming prevention
A. Preparation
B. Planning
C. Design
D. Implementation
E. Operation
F. Optimization
A. 2700
B. WLSE
C. 4124
D. 2006
E. 4112
A. routers
B. LAN switches
C. PBX switches
D. TDM switches
E. appliances
最新試題
What is the purpose of the Dynamic Configuration Tool? ()
Which of these statements regarding Cisco’s WebVPN support is correct?()
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
What is one reason you might recommend a solution using only autonomous access points to a customer? ()
Which two of these statements best describe the benefits of WPAv1? ()
Which item is a feature of Cisco Compatible Extensions, Version 3? ()
Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()
Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.) ()
In CiscoWorks LAN Management Solution, what are some of the examples of a managed device (sometimes called network elements)? (Choose three.) ()
At which stage of the Cisco Lifecycle Services approach should customer education presentations occur? ()