A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
您可能感興趣的試卷
你可能感興趣的試題
A. 6 dBm
B. 19 dBm
C. 5 dBm
D. 7 dBm
A. Summarize data center subnets.
B. Use passive interfaces to ensure appropriate adjacencies.
C. Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.
D. Adjust the default bandwidth value to ensure proper bandwidth on all links.
E. Advertise a default summary route into the data center core from the aggregation layer.
A. client antivirus software state
B. personal firewall settings
C. wireless cell bandwidth availability
D. IOS versions for routers and switches
E. appropriate client patch management level
F. appropriate QoS settings for client application
A. 19 dBm
B. 67 dBm
C. 10 dBm
D. 86 dBm
E. 5 dbm to 10 dBm
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
A. Layer 2 Edge mode
B. Layer 2 Central mode
C. Layer 2 In-Band mode
D. Layer 3 mode
A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.
A. Signal strength 0dBm, noise level 6dBm
B. Signal strength 8dBm, noise level 9dBm
C. Signal strength 4 dBm, noise level 4 dBm
D. Signal strength 6dBm, noise level 5 dBm
A. Never use passive interfaces.
B. Use NSSA areas from the core down.
C. Use totally stub areas to stop type 3 LSAs.
D. Use the lowest Ethernet interface IP address as the router ID.
E. Tune OSPF timers to enable OSPF to achieve quicker convergence
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. The iSCSI stack supports block-level storage for remote devices.
E. The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
最新試題
Which path selection protocol is used by Fibre Channel fabrics?()
During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which three of the following descriptions are true about the firewall modes? ()
Which two of these correctly describe asymmetric routing and firewalls? ()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
Which two statements about FCIP and iSCSI are correct?()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
In which two locations in an enterprise network can an IPS sensor be placed? ()
Which statement about data center access layer design modes is correct?()