多选题The CS-MARS appliance offers attackmitigatons using which twomethods? ()AAutomatically pushing ACLs to layer 3 devices to block the attacker’s trafficBAutomatically pushing commands to layer 2 switches to shutdown the attacker’s portsCAutomatically resetting the attacker’sTCP connectionsDRecommendingACLs tobe manuallypushed tolayer 3 devices such as routers/firewallsEOperating as an inline appliance, it automaticallyblocks malicious traffic inlineFWorking inconjuction with CSM to block the attacker’s traffic inline
多选题
The CS-MARS appliance offers attackmitigatons using which twomethods? ()
A
Automatically pushing ACLs to layer 3 devices to block the attacker’s traffic
B
Automatically pushing commands to layer 2 switches to shutdown the attacker’s ports
C
Automatically resetting the attacker’sTCP connections
D
RecommendingACLs tobe manuallypushed tolayer 3 devices such as routers/firewalls
E
Operating as an inline appliance, it automaticallyblocks malicious traffic inline
F
Working inconjuction with CSM to block the attacker’s traffic inline
参考解析
解析:
暂无解析
相关考题:
Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A、 Man-in-themiddle attackB、 Spoof attackC、 Land.C attackD、 Buffer OverflowE、 Day zero attackF、 Trojan Horse
CS-MARS works with which IOS feature to accomplish anomaly detection?()A、 IOS IPSB、 AutosecureC、 CSAD、 NetflowE、 IOS Network Foundation Protection (NFP)F、 IOS Firewall
Which of the following is an advantage of using a KVM with multiple servers?()A、Eliminates the need for backup tapesB、Increases redundancyC、Saves physical space in the racksD、Offers additional runtime for the UPS
IBM ProtecTIER Appliance Edition v2.5 software loaded on the IBM TS7650 Appliance has beenenhanced to support the OpenStorage (OST) API with which of the following applications?()A、EMC Networker B、Symantec NetBackup C、CommVault Simpana 9 D、eVault Backup Software
Your client has deployed a cisco wireless location appliance within their warehouse environment. they have been experiencing problems with tracking objects using active rfid tags. the rfid tag data is not being collected. On which device would you verify that rfid status has been enabled?()A、cisco wcsB、access pointC、wireless controllerD、location manager
The CS-MARS appliance offers attackmitigatons using which twomethods? ()A、 Automatically pushing ACLs to layer 3 devices to block the attacker’s trafficB、 Automatically pushing commands to layer 2 switches to shutdown the attacker’s portsC、 Automatically resetting the attacker’sTCP connectionsD、 RecommendingACLs tobe manuallypushed tolayer 3 devices such as routers/firewallsE、 Operating as an inline appliance, it automaticallyblocks malicious traffic inlineF、 Working inconjuction with CSM to block the attacker’s traffic inline
Your customer has deployed a cisco wireless location appliance within its warehouse environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. you use an access point scan to determine if the location appliance has been deployed correctly. Making which change to warehouse deployment location services will most likely correct the problem?()A、ensure channels are deployed such that they do not overlapB、allow for the automatic containment of rogue access pointsC、ensure each area is covered by a minimum of three access pointsD、ensure a minimum rssi value of -50
Your customer has deployed a Cisco Wireless Location Appliance within its warehouse environment. However,employees there have been experiencing problems when tracking objects using active RFIDtags. The RFID tag data is not being collected. On which device would you verify that RFIDs have beenenabled?()A、Cisco WCSB、access pointC、location managerD、wireless controller
Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()A、 SDEEB、 TelnetC、 ConsoleD、 FTPE、 HTTPSF、 SSH
Yours truly,customer has deployed a cisco wireless location appliance within its warehouse environment. however, employees there have been experiencing problems when tracking objects using active rfid tags. the rfid tag data is not being collected. On which device would you verify that rfids have been enabled?()A、access pointB、location managerC、wireless controllerD、cisco wcs
Which two statements about the Wireless Location Appliance are true?()A、a Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllersB、before using the Web interface, the initial configuration of the Wireless Location Appliance must be done using the command-line interface (CLI)C、the Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliance.D、the Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP)E、the Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
Which statement best describes the Cisco 2700 Location Appliance collection of location information for wireless devices?()A、all Wi-Fi devices on the WLAN send directly received signal strength indication (RSSI) information to the Cisco Wireless Location Appliance through SNMPB、an AP collects RSSI information which is forwarded to wireless controllers through LWAPP. Wireless controllers forward aggregated RSSI to the location appliance through SNMPC、the APs collect received signal strength indication (RSSI) information from all Wi-Fi devices and forward the information to the Cisco Wireless Location Appliance through the LWAPPD、the Cisco WLAN controllers bypass the received signal strength indication (RSSI) information from all Wi-Fi devices to the Cisco Wireless Location Appliance through the LWAPP
Which of the following parameter sets must be configured on the Cisco Wireless Location Appliance?()A、network connectionsB、location viewsC、access pointsD、object definitions
You are configuring the DX appliance for the first time using the console. Which two configurationvalues can be set using the first time configuration screen?() (Choose two.)A、the user roleB、the ether0 IP addressC、the default route for this DX applianceD、the address of a network TFTP server
多选题You are configuring the DX appliance for the first time using the console. Which two configurationvalues can be set using the first time configuration screen?() (Choose two.)Athe user roleBthe ether0 IP addressCthe default route for this DX applianceDthe address of a network TFTP server
单选题Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()ACisco IOS routerBCisco PIX 500 series security applianceCCisco 4200 series IPS applianceDCisco ASA 5500 series security appliance
多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention
多选题Which access methods can CS-MARS use toget configuration information from an Adaptive SecurityAppliance (ASA)? ()ASDEEBTelnetCConsoleDFTPEHTTPSFSSH
单选题CS-MARS works with which IOS feature to accomplish anomaly detection?()A IOS IPSB AutosecureC CSAD NetflowE IOS Network Foundation Protection (NFP)F IOS Firewall
多选题Which two statements about the Wireless Location Appliance are true? ()AA Wireless Location Appliance acts as a server to one or more Cisco WCSs. It collects, stores, and passes on data from its associated Cisco WLAN controllers.BBefore using the Web interface, the initial configuration of the Wireless Location appliance must be done using the command-line interface (CLI).CThe Cisco 2000, 2700, 4100, and 4400 are examples of Wireless Location Appliances.DThe Wireless Location Appliance visually displays the location information of WLAN devices and forwards this information to third-party applications using the Simple Network Management Protocol (SNMP).EThe Wireless Location Appliance visually tracks up to 15,000 WLAN devices and can store this information for 90 days.
单选题Which type of attacks can be monitored and mitigated by CS-MARS using NetFlow data?()A Man-in-themiddle attackB Spoof attackC Land.C attackD Buffer OverflowE Day zero attackF Trojan Horse