Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、 core layerB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunking
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()
- A、 core layer
- B、 bridging two VLANs on one switch
- C、 between two Layer 2 devices with trunking
- D、 between two Layer 2 devices without trunking
相关考题:
●按照检测数据的来源可将入侵检测系统(IDS)分为 (60) 。(60) A.基于主机的IDS和基于网络的IDSB.基于主机的IDS和基于域控制器的IDSC.基于服务器的IDS和基于域控制器IDSD.基于浏览器的IDS和基于网络的IDS
Examinethelistofvariablesandtheirdatatypes:AMEDATATypeTS,TS1TIMESTAMPTSZTIMESTAMPWITHTIMEZONETLZTIMESTAMPWITHLOCALTIMEZONEIYMINTERVALYEARTOMONTHIDS,IDSIINTERVALYEARToSECONDWhichthreeexpressionsusingthenewdataandtimedatatypesarevalid?()A.IDS*2B.TS+IYMC.TS–TSID.IDS–TSE.IDS+IYM
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A. core layerB. bridging two VLANs on one switchC. between two Layer 2 devices withtrunkingD. between two Layer 2 devices withouttrunking
IDS和IPS传感器可以是以下设备中的哪些() A.配置了CiscoIOSIPS软件的路由器B.专门的Cisco网络防火墙C.专门设计用来提供专有IDS或IPS服务的设备D.安装在相应的安全设备、交换机或路由器上的网络模块
What is the use of NPV in Cisco Unified Computing Systems? () A、 Compatibility with third-party Fibre Channel switchesB、 Faster throughputC、 Reduce domain IDs in a Fibre Channel environmentD、 Support for increased number of VSANsE、 Support for SAN port channels
An IPS sensor with3 sniffing interfaces can be configuredas: ()A、 3 promiscuous sensorsB、 3 inline sensorsC、 1 inline sensor, 1 promiscuous sensorD、 2 inline sensors, 1 promiscuous sensors
Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.
Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()A、 AirDefense for wireless IDS is required by autonomous APs.B、 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.C、 APs only monitor the RF channels that are servicing the clients.D、 Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.E、 Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
What is the default Time to Live (TTL) valuse in Cisco FabricPath?()A、 128B、 32C、 64D、 Dependent on the number of switch IDs in the topology
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network
Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".
The Cisco Unified Wireless Network minimizes the TCO and maximizes woreless network uptime by optimizing which two deployment, management, and security features?()A、 unified wireless and wired infrastructure for a single point of control for all WLAN trafficB、 simplified management of central or remotely located access pointsC、 extension features to wired network services, such as denial of service prevention and ACLsD、 threat defense with a robust wired IDS
Which statement about NPIV is true?()A、 NPIV provides a means to assign multiple Fibre Channel IDs to a single N-port.B、 NPIV can be enabled on a per-VSAN basis.C、 NPIV requires a "write erase" and then reload the switch in order to come up into NPIV mode. D、 NPIV is a Cisco proprietary feature and as such works only between two Cisco switches.E、 NPIV must not be enabled on a switch that is also running N-port virtualization.
多选题Which two of these statements best describe the benefits of Cisco’s wireless IDS functionality? (Choose two.) ()AAirDefense for wireless IDS is required by autonomous APs.B2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.CAPs only monitor the RF channels that are servicing the clients.DCisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.EAutonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
单选题Which statement about NPIV is true?()A NPIV provides a means to assign multiple Fibre Channel IDs to a single N-port.B NPIV can be enabled on a per-VSAN basis.C NPIV requires a write erase and then reload the switch in order to come up into NPIV mode. D NPIV is a Cisco proprietary feature and as such works only between two Cisco switches.E NPIV must not be enabled on a switch that is also running N-port virtualization.
多选题What is the use of NPV in Cisco Unified Computing Systems? ()ACompatibility with third-party Fibre Channel switchesBFaster throughputCReduce domain IDs in a Fibre Channel environmentDSupport for increased number of VSANsESupport for SAN port channels
单选题What is the default Time to Live (TTL) valuse in Cisco FabricPath?()A 128B 32C 64D Dependent on the number of switch IDs in the topology
多选题Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()Acore layerBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunking
多选题IDS和IPS传感器可以是以下设备中的哪些()A配置了Cisco IOS IPS软件的路由器B专门的Cisco网络防火墙C专门设计用来提供专有IDS或IPS服务的设备D安装在相应的安全设备、交换机或路由器上的网络模块
单选题按照检测数据的来源可将入侵检测系统(IDS)分为()。A基于主机的IDS和基于网络的IDSB基于主机的IDS和基于域控制器的IDSC基于服务器的IDS和基于域控制器IDSD基于浏览器的IDS和基于网络的IDS
多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.