A. security contexts
B.- transparent firewall
C. WebVPN
D. Active/Active failover
E. low latency queuing
F. AIP-SSM intrusion prevention
您可能感興趣的試卷
你可能感興趣的試題
A. the large enterprise with a global presence
B. the large enterprise with a single campus
C. the small- or medium-sized business
D. All companies, regardless of size
Which two methods enable a PC connected to the PartnerNet to connect to a server on DMZ1 but deny it access to both DMZ2 and the Inside network? (Choose two.)()
A. Enable port address translation for traffic sourced from the PartnerNet PC to the DMZ1 server.
B. Disable NAT control on DM72 and the Inside interfaces only.
C. Enable static NAT translation for the DMZ1 server, and then use an ACL to permit the PartnerNet PC traffic to the DMZ1 server.
D. Disable NAT control on the DMZ1 interface only.
E. Lower the security level of the DMZ2 interface to 30.
F. Raise the security level of the PartnerNet interface to 55.
A. 10.0.0.0/24
B. 10.0.0.0/16
C. 10.0.0.0/14
D. 10.0.0.0/15
A. CiscoView
B. Resource Manager Essentials
C. Device Fault Manager
D. Campus Manager
A. offers a feature-rich implementation alternative to Wi-Fi certification
B. accelerates the availability of innovative features while maintaining interoperability
C. provides innovative features only on Cisco’s wireless client adapters
D. provides an evolving set of specifications for interoperability
E. eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee
最新試題
Which two of these statements best describe fast secure roaming? (Choose two.)()
Which two of these are correct regarding access control lists? (Choose two.) ()
The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()
Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
What is the purpose of the Dynamic Configuration Tool? ()
Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft? ()
What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()
Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()