单选题Which feature is a potential security weakness of a traditional stateful firewall?()AIt cannot support UDP flows.BIt cannot ensure each TCP connection follows a legitimate TCP three-way handshake.CIt cannot detect application-layer attacks.DThe status of TCP sessions is retained in the state table after the sessions terminate.

单选题
Which feature is a potential security weakness of a traditional stateful firewall?()
A

It cannot support UDP flows.

B

It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.

C

It cannot detect application-layer attacks.

D

The status of TCP sessions is retained in the state table after the sessions terminate.


参考解析

解析: 暂无解析

相关考题:

你们需要安保专家对场馆做安全评估吗?A.Do you need a security expert to value the potential danger of the region?B.Do you need a security expert to calculate the potential adventure of the area?C.Do you need a security expert to account the potential risks of the region?D.Do you need a security expert to evaluate the potential risks of the place?

Which type of deployment utilizes ISRs with Cisco IOS Security feature sets to provide an ideal, low-cost, yet capable and powerful platform?() A.Financial deploymentsB.Medium deploymentsC.Large deploymentsD.Commercial deploymentsE.Small deployments

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

Which feature is a potential security weakness of a traditional stateful firewall?()A、It cannot support UDP flows.B、It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.C、It cannot detect application-layer attacks.D、The status of TCP sessions is retained in the state table after the sessions terminate.

RMAN provides more granular catalog security through which feature?()A、Virtual private databaseB、Virtual private catalogC、RMAN virtual databaseD、RMAN secure catalogE、Oracle Database Vault

The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()A、 intrusion protectionB、 identityC、 secure connectivityD、 security management

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A、 WebVPN for SSLB、 IPSecC、 AIMD、 Stateful packet inspection

What is an ideal Cisco solution to protect a campus network and services from potential security breaches?()A、Cisco Security Device ManagerB、Cisco Security AgentC、Cisco VPN ClientD、Cisco Intrusion Detection System

Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()A、IPSec VPNB、SSL VPNC、port securityD、port security with statically configured MAC addressesE、private VLANs

In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A、private VLANsB、port securityC、BPDU guardD、dynamic ARP inspectionE、DHCP snooping

Which type of deployment utilizes ISRs with Cisco IOS Security feature sets to provide an ideal, low-cost, yet capable and powerful platform?()A、Small deploymentsB、Large deploymentsC、Medium deploymentsD、Commercial deploymentsE、Financial deployments

Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()A、 Cisco lOS Matrix NavigatorB、 Cisco Feature NavigatorC、 Cisco lOS Package PlannerD、 Cisco lOS Security PlannerE、 Cisco Dynamic Configuration Tool

A tape drive containing a jammed tape must be taken off-site to be repaired. Which of the following should be considered FIRST?()A、Downtime necessary to reinstall the repaired driveB、Data security policies and proceduresC、Potential cooling problems due to the missing driveD、Redundant or replacement data backup solutions

You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers

多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

单选题Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A WebVPN for SSLB IPSecC AIMD Stateful packet inspection

单选题A tape drive containing a jammed tape must be taken off-site to be repaired. Which of the following should be considered FIRST?()A Downtime necessary to reinstall the repaired driveB Data security policies and proceduresC Potential cooling problems due to the missing driveD Redundant or replacement data backup solutions

多选题The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()Aintrusion protectionBidentityCsecure connectivityDsecurity management

单选题The ISPS Code consists of a mandatory section-Part A, which shows()Athe detailed security-related requirementsBguidelines to meet security-related requirementsCthe detailed security-related requirements and the guidelines to meet themDhow to run a shipping company considering the potential terrorism action

单选题RMAN provides more granular catalog security through which feature?()A Virtual private databaseB Virtual private catalogC RMAN virtual databaseD RMAN secure catalogE Oracle Database Vault

单选题Which type of deployment utilizes ISRs with Cisco IOS Security feature sets to provide an ideal, low-cost, yet capable and powerful platform?()ASmall deploymentsBLarge deploymentsCMedium deploymentsDCommercial deploymentsEFinancial deployments

多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network

多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates