Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()A、 uses Netflow data for anomaly detectionsB、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackC、 accept events inputs from different network devicesvia syslog, SDEE and SNMPD、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityE、 pushes ACLs to network devices to only block the malicious trafficF、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location
Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()
- A、 uses Netflow data for anomaly detections
- B、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attack
- C、 accept events inputs from different network devicesvia syslog, SDEE and SNMP
- D、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuity
- E、 pushes ACLs to network devices to only block the malicious traffic
- F、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location
相关考题:
Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?() A.MARSB.NACC.VPND.IPS
You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBAR and NetFlow?() A. NBAR examines data in Layers 1 and 4.B. NBAR examines data in Layers 3 and 4.C. NetFlow examines data in Layers 3 and 4.D. NBAR examines data in Layers 2 through 4.
The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()A、 IPSB、 VPN ConcentratorC、 ACS serverD、 PIX firewallE、 CSA MCF、 DDoS Anomaly Guard and Detector
Given the correct input parameters, the Cisco WCS Planning Tool can calculate a recommendedaccess point count for which three uses? ()A、data/coverageB、voiceC、locationD、meshE、publicF、WPAN
Which of the following is less vulnerable to threats and attacks because it is not associated with one specific operating system?()A、Cisco Voice and Video over VPNB、Cisco Secure Access Control ServerC、Cisco NAC ApplianceD、Cisco Threats Response
Cisco IOS NetFlow gathers data that can be used in which three of these? ()A、 accountingB、 authenticationC、 authorizationD、 network monitoringE、 network planning
Which item is correct regarding Cisco IOS IPS on Cisco IOS Release 12.4(11)T and later ?()A、requires the Basic or Advanced Signature Definition FileB、uses the built-in signatures that come with the Cisco IOS image as backupC、supports SDEE,SYSLOG,and SNMP for sending Cisco IPS alertsD、uses Cisco IPS 5.x signature format
Which of the following is an example of a security technology that could be enabled by Netflow?()A、 Anomaly DetectionB、 SYN CookiesC、 Application InspectionD、 Content filteringE、 Anti-X ProtectionF、 Anti Virus
Which two benefits does the Juniper DX provide?() (Choose two.)A、It compresses all images.B、It protects servers from DDoS attacks.C、It protects servers from SynFlood attacks.D、It loads all content from web servers to flash.
Which two functions are performed in Quick Setup?() (Choose two.)A、operating modeB、auto-deploymentC、speed and duplex settingsD、registration server designation
You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBAR and NetFlow?()A、NBAR examines data in Layers 1 and 4.B、NBAR examines data in Layers 3 and 4.C、NetFlow examines data in Layers 3 and 4.D、NBAR examines data in Layers 2 through 4.
Which two statements are correct regarding multicast implementation using a WLAN controller (v5.2) and AP?()A、Multicast traffic is sent out on Cisco APs at the highest mandatory data rate.B、Multicast traffic is sent out on Cisco APs at the highest supported data rate.C、On Cisco APs, multicast traffic and beacons are sent out at the same data rates to maintain a common cell size for normal data as well as multicast data.D、If there is more than one mandatory data rate, multicast traffic will be sent at the highest mandatory rate and beacons will be sent at the lowest mandatory rate.E、On Cisco APs, multicast traffic will be sent out at the highest data rate that a client can maintain with the AP.
Which statement is correct regarding NBAR and NetFlow?()A、NetFlow uses five key fields for the flowB、NBAR examines data in Layers 3 and 4C、NetFlow examines data in Layers 3 and 4D、NBAR examines data in Layers 2 through 4E、NetFlow examines data in Layers 2 through 4
Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()A、Signature-based detectionB、Anomaly-based detectionC、Honey pot detectionD、Policy-based detection
Observe the following options carefully, which two attacks focus on RSA? ()A、BPA attackB、Adaptive chosen ciphertext attackC、DDoS attackD、Man-in-the-middle attack
Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()A、MARSB、NACC、VPND、IPS
Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)A、NATB、OSPFC、SNMPD、SCREEN options
多选题Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()Auses Netflow data for anomaly detectionsBbuilds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackCaccept events inputs from different network devicesvia syslog, SDEE and SNMPDdynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityEpushes ACLs to network devices to only block the malicious trafficFusing topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location
单选题() is a precaution which contributes to avoiding trouble under normal operating conditions.AConstant inspectionBKeeping constant loadCRemaining constant temperatureDVarying speed
单选题Which statement is correct regarding NBAR and NetFlow?()ANetFlow uses five key fields for the flowBNBAR examines data in Layers 3 and 4CNetFlow examines data in Layers 3 and 4DNBAR examines data in Layers 2 through 4ENetFlow examines data in Layers 2 through 4
单选题You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBAR and NetFlow?()ANBAR examines data in Layers 1 and 4.BNBAR examines data in Layers 3 and 4.CNetFlow examines data in Layers 3 and 4.DNBAR examines data in Layers 2 through 4.
多选题Cisco IOS NetFlow gathers data that can be used in which three of these? ()AaccountingBauthenticationCauthorizationDnetwork monitoringEnetwork planning
单选题Which of the following is an example of a security technology that could be enabled by Netflow?()A Anomaly DetectionB SYN CookiesC Application InspectionD Content filteringE Anti-X ProtectionF Anti Virus
多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.
多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector
单选题You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBARand NetFlow?()A NBAR examines data in Layers 1 and 4.B NBAR examines data in Layers 3 and 4.C NetFlow examines data in Layers 3 and 4.D NBAR examines data in Layers 2 through 4.