Please study the exhibit.What are two options available when using the Security Audit Configuration task in Cisco SDM?()
A.Perform a One-step lockdown on the Router
B.Perform a Virus Scan
C.Perform a Secure audit on the Router
D.Perform a Denial Of Service attack on the Router to verify that it is protected
E.Perform a real-time inspection of incoming traffic destined for the router
您可能感興趣的試卷
你可能感興趣的試題
Please study the exhibit.Which Cisco SDM configuration task is used to enable the translation of the inside network private IP address to the public IP address?()
A.Firewall and ACL
B.NAT
C.Routing
D.Interface and connections
E.VPN
F.Security Audit
A.Prepare
B.Design
C.Position
D.Develop
E.Plan
F.Perform
A.Frame-Relay
B.Leased Line
C.MPLS
D.DSL
E.Cable
F.Wireless
最新試題
When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which Cisco SDM Configuration task would you use to enable access and inspection rules on the WAN interface, preventing any external traffic from entering the network unless that traffic is a reply to a session that originated in the internal network?()
When using Cisco Network Assistant to configure smartports, Which tow of the following roles can belong to a VLAN of the type "access" ?()
During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()
You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested in WAN devices. Match the appropriate WAN device with the correct description.
You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which two statements correctly identify the reasons why there is only one static route and there are no dynamic protocols for the configuration shown?()
During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()
What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()
Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()
When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()