多选题Which two of these are advantages of placing the VPN device parallel to the firewall?()Ahigh scalabilityBthe design supports a layered security modelCfirewall addressing does not need to changeDIPsec decrypted traffic is inspected by the firewallEthere is a centralized point for logging and content inspection

多选题
Which two of these are advantages of placing the VPN device parallel to the firewall?()
A

high scalability

B

the design supports a layered security model

C

firewall addressing does not need to change

D

IPsec decrypted traffic is inspected by the firewall

E

there is a centralized point for logging and content inspection


参考解析

解析: 暂无解析

相关考题:

Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.) A. IGP routes advertised by P routersB. IGP routes advertised by PE routersC. VPN routes advertised by PE routersD. VPN routes advertised by CE routers

Which two methods are used to assign an IP address to a WX device? ()(Choose two.) A. SSHB. TelnetC. WebViewD. device front panelE. serial console (command-line interface)

Which of the following are common VPN transports? (Select TWO)() A.RDPB.VNCC.SSLD.PPTPE.RAS

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?() A. fewer devices to manageB. moderate-to-high scalabilityC. stateful inspection of decrypted VPN trafficD. increased bandwidth with additional interfacesE. decreased complexity as traffic is filtered from the firewall

Which two of these are advantages of placing the VPN device parallel to the firewall?() A. high scalabilityB. the design supports a layered security modelC. firewall addressing does not need to changeD. IPsec decrypted traffic is inspected by the firewallE. there is a centralized point for logging and content inspection

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?() A.Cisco IOS IPsec/SSL VPN clientB.Cisco VPN ClinetC.ISDN terminal adapterD.Cisco Adaptive Security Appliance

For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A、Broadband serviceB、Headend VPN deviceC、VPN access deviceD、Tunnel

Which two actions protect a resource file from direct HTTP access within a web application?()A、Placing it in the /secure directoryB、Placing it in the /WEB-INF directoryC、Placing it in the /META-INF/secure directoryD、Creating a  element within the deployment descriptor

A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall

Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A、 Cisco Integrated Service RoutersB、 Cisco ASA 5500 Series Security ApplianceC、 CiscoWebVPN Services ModuleD、 CiscoIPsec VPN Module

Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network

In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking

Which two of these are advantages of placing the VPN device parallel to the firewall?()A、 high scalabilityB、 the design supports a layered security modelC、 firewall addressing does not need to changeD、 IPsec decrypted traffic is inspected by the firewallE、 there is a centralized point for logging and content inspection

Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.)A、IGP routes advertised by P routersB、IGP routes advertised by PE routersC、VPN routes advertised by PE routersD、VPN routes advertised by CE routers

Which two methods are used to assign an IP address to a WX device? ()(Choose two.)A、SSHB、TelnetC、WebViewD、device front panelE、serial console (command-line interface)

Which two external authentication servers are supported for administrative access to a Junos device?()A、RADIUSB、LDAPC、ACED、TACACS+

You deploy mobile devices that run Microsoft Windows Mobile 5.0.   A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible.   You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated.  Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.

Which of the following are common VPN transports? (Select TWO)()A、RDPB、VNCC、SSLD、PPTPE、RAS

多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking

多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus

多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking

多选题What are two advantages to customers with L2 MPLS VPNs? ()(Choose two.)AService provider has routing control.BCustomers control their own routing.CCan communicate protocols other than IP.DAllows them to use separate networks for IP and VPN traffic.

单选题For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()ABroadband serviceBHeadend VPN deviceCVPN access deviceDTunnel

多选题Which of the following are common VPN transports? (Select TWO)()ARDPBVNCCSSLDPPTPERAS

多选题Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()Afewer devices to manageBmoderate-to-high scalabilityCstateful inspection of decrypted VPN trafficDincreased bandwidth with additional interfacesEdecreased complexity as traffic is filtered from the firewall