多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

多选题
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()
A

security contexts

B

- transparent firewall

C

WebVPN

D

Active/Active failover

E

low latency queuing

F

AIP-SSM intrusion prevention


参考解析

解析: 暂无解析

相关考题:

Which two parameters are configured in IPsec policy? ()(Choose two.) A. modeB. IKE gatewayC. security proposalD. Perfect Forward Secrecy

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.) A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]

You are configuring the DX appliance for the first time using the console. Which two configurationvalues can be set using the first time configuration screen?() (Choose two.) A. the user roleB. the ether0 IP addressC. the default route for this DX applianceD. the address of a network TFTP server

Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()A、Cisco IOS routerB、Cisco PIX 500 series security applianceC、Cisco 4200 series IPS applianceD、Cisco ASA 5500 series security appliance

The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()A、 IPSB、 VPN ConcentratorC、 ACS serverD、 PIX firewallE、 CSA MCF、 DDoS Anomaly Guard and Detector

The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance

Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A、 WebVPN for SSLB、 IPSecC、 AIMD、 Stateful packet inspection

Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()A、 offers a feature-rich implementation alternative to Wi-Fi certificationB、 accelerates the availability of innovative features while maintaining interoperabilityC、 provides innovative features only on Cisco’s wireless client adaptersD、 provides an evolving set of specifications for interoperabilityE、 eliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee

When configuring a Cisco Adaptive Security Appliance in multiple context mode, which of the follow capabilities are supported?()A、 Multicastis supportedB、 Dynamic routing protocols are supportedC、 VPN configurations are supportedD、 Static routes are supported

Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()A、 Cisco lOS Matrix NavigatorB、 Cisco Feature NavigatorC、 Cisco lOS Package PlannerD、 Cisco lOS Security PlannerE、 Cisco Dynamic Configuration Tool

At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]

Which two parameters are configured in IPsec policy? ()(Choose two.)A、modeB、IKE gatewayC、security proposalD、Perfect Forward Secrecy

You are configuring the DX appliance for the first time using the console. Which two configurationvalues can be set using the first time configuration screen?() (Choose two.)A、the user roleB、the ether0 IP addressC、the default route for this DX applianceD、the address of a network TFTP server

多选题Which two are components of the enhanced services software architecture?() (Choose two.)ALinux kernelBrouting protocol daemonCsession-based forwarding moduleDseparate routing and security planes

单选题Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A WebVPN for SSLB IPSecC AIMD Stateful packet inspection

多选题A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()AThe data center would need several devices to achieve its goal.BIncreased usage of standalone devices is cost-effective.CUsing integrated blades would only require two devices.DPutting all security devices in a single chassis provides a single point of failure.

多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]

多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM

多选题You are configuring the DX appliance for the first time using the console. Which two configurationvalues can be set using the first time configuration screen?() (Choose two.)Athe user roleBthe ether0 IP addressCthe default route for this DX applianceDthe address of a network TFTP server

多选题Which two of these statements best describe fast secure roaming? (Choose two.)()Aavailable only in autonomous APsBavailable in autonomous and lightweight APsCa feature of WDS in autonomous APsDa feature of WDS in lightweight APsErequires at least one AP and one Wireless LAN Services Module

多选题Which two of these statements best describe the benefits of the Cisco Compatible Extensions Program? (Choose two.)()Aoffers a feature-rich implementation alternative to Wi-Fi certificationBaccelerates the availability of innovative features while maintaining interoperabilityCprovides innovative features only on Cisco’s wireless client adaptersDprovides an evolving set of specifications for interoperabilityEeliminates the need for testing by providing innovative features to wireless client vendors through a one-time license fee

多选题What are two security features of the Cisco Secure Router 500 Series? ()ACisco Intrusion Prevention SystemBCisco IOS Software FirewallCCisco IOS Easy VPNDCisco Unified Wireless NetworkingECisco ASA Hardware Firewall

单选题When configuring a Cisco Adaptive Security Appliance in multiple context mode, which of the follow capabilities are supported?()A Multicastis supportedB Dynamic routing protocols are supportedC VPN configurations are supportedD Static routes are supported

多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector

多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

多选题Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)ATraffic is permitted from the trust zone to the untrust zone.BIntrazone traffic in the trust zone is permitted.CAll traffic through the device is denied.DThe policy is matched only when no other matching policies are found.

多选题Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()ACisco lOS Matrix NavigatorBCisco Feature NavigatorCCisco lOS Package PlannerDCisco lOS Security PlannerECisco Dynamic Configuration Tool