多选题In which two locations in an enterprise network can an IPS sensor be placed? ()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

多选题
In which two locations in an enterprise network can an IPS sensor be placed? ()
A

bridging VLANs on two switches

B

bridging two VLANs on one switch

C

between two Layer 2 devices with trunking

D

between two Layer 2 devices without trunking

E

between a Layer 2 device and a Layer 3 device with trunking


参考解析

解析: 暂无解析

相关考题:

The J-Web application can install the JUNOS software from which two locations?() A. SDXB. local PCC. BSD shellD. remote host

Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking

Which two locations can be configured as a source for the IOS image in the boot system command?() A.RAMB.NVRAMC.flash memoryD.HTTP serverE.TFTP serverF.Telnet server

Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)A、regular upgrade processB、multivendor supportC、cost savingsD、product varietyE、well-tested interoperability

Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

You can install Cisco DCNM-LAN on a supported version of which two operating systems? ()A、 Microsoft Windows ServerB、 Novell SUSE Linux Enterprise ServerC、 Oracle Enterprise LinuxD、 Red Hat Enterprise LinuxE、 VMware ESX

Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.

A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()A、SSIDB、WPA PassphraseC、WEP KeyD、Network Path

Which two of these are characteristics of MPLS VPNs? ()A、 Layer 3 MPLS VPNs can forward only IP packetsB、 Layer 2 MPLS VPNs can forward any network protocolC、 MPL S label paths are automatically formed based on Layer 2 framesD、 Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 framesE、 In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies

Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking

In which two locations can Nexus 1000v VSM be deployed?()A、Control Plane Virtual ApplianceB、Control Plane Physical ApplianceC、Control Plane Virtual ESX SwitchD、Control Plane Physical ESX Switch

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking

Which two locations can be configured as a source for the IOS image in the boot system command?()A、RAMB、NVRAMC、flash memoryD、HTTP serverE、TFTP serverF、Telnet server

多选题A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()AhostBIP phoneCaccess layer switchDdistribution layer switchEcore layer switch

多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.

多选题Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)Aregular upgrade processBmultivendor supportCcost savingsDproduct varietyEwell-tested interoperability

多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

多选题Which two devices can interfere with the operation of a wireless network because they operate on similar frequencies? (Choose two.)()AcopierBmicrowave ovenCtoasterDcordless phoneEIP phoneFAM radio

多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking

多选题Which two of these are characteristics of an IPS device?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IPS interface and exits on another

多选题The J-Web application can install the JUNOS software from which two locations?()ASDXBlocal PCCBSD shellDremote host

多选题Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()ALoopback interfaceBCommand and control interfaceCMonitoring interfaceDManagement interface

单选题Which is the main difference between host-based and network-based intrusion prevention?()AHost-based IPS can work in promiscuous mode or inline mode.BNetwork-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.CNetwork-based IPS is better suited for inspection of SSL and TLS encrypted data flows.DHost-based IPS deployment requires less planning than network-based IPS.

多选题You can install Cisco DCNM-LAN on a supported version of which two operating systems? ()AMicrosoft Windows ServerBNovell SUSE Linux Enterprise ServerCOracle Enterprise LinuxDRed Hat Enterprise LinuxEVMware ESX

多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network