多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

多选题
The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()
A

security contexts

B

- transparent firewall

C

WebVPN

D

Active/Active failover

E

low latency queuing

F

AIP-SSM intrusion prevention


参考解析

解析: 暂无解析

相关考题:

( 33 )如果一台 Cisco PIX 525 防火墙有如下配置:Pix525(config)#nameif ethernet0 P1 security100Pix525(config)#nameif ethernet1 P2 security0Pix525(config)#nameif ethernet2 P3 security50那么常用的端口连接方案是A )端口 P1 作为外部接口, P2 连接 DMZ , P3 作为内部接口B )端口 P1 作为内部接口, P2 连接 DMZ , P3 作为外部接口C )端口 P1 作为外部接口, P2 作为内部接口, P3 连接 DMZD )端口 P1 作为内部接口, P2 作为外部接口, P3 连接 DMZ

如果一台 Csico PIX525 防火墙有如下配置Pix525(config)#nameeif ethernet0 outside security VAL1Pix525(config)#nameeif ethernet1 inside security VAL2Pix525(config)#nameeif ethernet2 DMZ security VAL3那么通常 VAL1 、 VAL2 、 VAL3 的取值分别是A)0 、 50 、 100B)0 、 100 、 50C)100 、 0 、 50D)100 、 50 、 0

Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?() A. set content-filtering profilepermit-command block-mimeB. set content-filtering profileblock-mimeC. set content-filtering block-content-typeblock-mimeD. set content-filtering notifications block-mime

The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()A、 IPSB、 VPN ConcentratorC、 ACS serverD、 PIX firewallE、 CSA MCF、 DDoS Anomaly Guard and Detector

The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

When installing processors with mixed stepping levels in a server, which of the following guidelines must be followed? ()A、 The processors must have different frequencies set to operate.B、 The processor with the highest feature set must be the bootstrap processor.C、 The processors must have different cache sizes set to operate.D、 The processors must have the same cache size set.E、 The processor with the lowest feature set must be the bootstrap processor.

You established access to menu modules using roles. While testing the application, you need access to all the menus in the SALES form module for all the roles. Which method will override the Menu Module Roles property to allow you to access all the menu items?()A、Disable the values for the Menu Module Roles property. B、Set the Use Security value in the form module Property Palette to 'True'. C、Set the Use Security value in the form module Property Palette to 'False'. D、Set the Use Security value in the menu module Property Palette to 'True'. E、Set the Use Security value in the menu module Property Palette to 'False'.

The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A、 show asp dropB、 show counters dropC、 show security-policyD、 show policy-map

Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A、 WebVPN for SSLB、 IPSecC、 AIMD、 Stateful packet inspection

When configuring a Cisco Adaptive Security Appliance in multiple context mode, which of the follow capabilities are supported?()A、 Multicastis supportedB、 Dynamic routing protocols are supportedC、 VPN configurations are supportedD、 Static routes are supported

Which Cisco product is a hardware component that supports content filtering and other gateway security functions for the Catalyst 6500 Series?()A、Cisco Private Internet Exchange (PIX) FirewallB、Cisco VPN/Security Management Solution (VMS)C、Cisco Internetwork Operating System (IOS) FirewallD、Cisco Firewall Services Module (FWSM)

Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A、 Security ControlsB、 Database AccessC、 Set Security ProfileD、 Authorize Group Reassignment

A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

Which CLI command do you use to block MIME content at the [edit security utm feature-profile] hierarchy?()A、set content-filtering profile permit-command block-mimeB、set content-filtering profile block-mimeC、set content-filtering block-content-type block-mimeD、set content-filtering notifications block-mime

You are developing a Windows Communication Foundation (WCF) service. You need to enable security auditing for all events. What should you do?()A、Set the serviceAuthorizationAuditLevel setting to Success and the messageAuthenticationAuditLevel setting to Success.B、Set the messageAuthenticationAuditLevel setting to Success and the auditLogLocation setting to Application.C、Set the serviceAuthorizationAuditLevel setting to SuccessAndFailure and the messageAuthenticationAuditLevel setting to SuccessAndFailure.D、Set the messageAuthenticationAuditLevel setting to SuccessAndFailure and the auditLogLocation setting to Security.

You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

单选题()shall set security levels and provide guidance for protection from security incidents.AThe Contracting GovernmentsBThe Port AuthoritiesCThe MasterDThe Company Security

单选题Examine the following items, which one offers a variety of security solutions, including firewall, IPS, VPN,antispyware, antivirus, and antiphishing features?()ACisco IOS routerBCisco PIX 500 series security applianceCCisco 4200 series IPS applianceDCisco ASA 5500 series security appliance

单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()AThe best option is to create an Outlook Protection Rule to comply with the Company.com security policy.BThe best option is to set up a content filtering feature to comply with the Company.com security policy.CThe best option is to create a transport rule to comply with the Company.com security policy.DThe best option is to set up a sender reputation feature to comply with the Company.com security policy.

多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector

单选题如果一台Cisco PIX 525防火墙有如下配置:Pix525(config)#nameif ethemet0 P 1 security 100Pix525(config)#nameif ethemet1 P2 security0Pix525(config)#nameif ethemet2 P3 security50那么常用的端口连接方案是(  )。A端口P1作为外部接口,P2连接DMZ,P3作为内部接口B端口P1作为内部接口,P2连接DMZ,P3作为外部接口C端口P1作为外部接口,P2作为内部接口,P3连接DMZD端口P1作为内部接口,P2作为外部接口,P3连接DMZ

多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

单选题Which of these statements regarding Cisco’s WebVPN support is correct?()A Cisco ISR Routers with the Enhanced Security Bundles support WebVPN.B Cisco security appliances act as a proxy between the end user and the target web server.C Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN.D Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.

单选题Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A WebVPN for SSLB IPSecC AIMD Stateful packet inspection

单选题The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A show asp dropB show counters dropC show security-policyD show policy-map

单选题Which deployed VoWLAN client security option is recommended by Cisco?()ALayer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationBLayer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughCLayer 3 with Layer 3 Security set to VPN Pass-ThroughDLayer 2 with Layer 2 Security set to 802.1X

单选题Which Cisco product is a hardware component that supports content filtering and other gateway security functions for the Catalyst 6500 Series?()ACisco Firewall Services Module (FWSM)BCisco Private Internet Exchange (PIX) FirewallCCisco VPN/Security Management Solution (VMS)DCisco Internetwork Operating System (IOS) Firewall

多选题When installing processors with mixed stepping levels in a server, which of the following guidelines must be followed? ()AThe processors must have different frequencies set to operate.BThe processor with the highest feature set must be the bootstrap processor.CThe processors must have different cache sizes set to operate.DThe processors must have the same cache size set.EThe processor with the lowest feature set must be the bootstrap processor.