单选题A network IPS provides which of the following?()AThe layer 3 protocol on which other protocols like TCP and UDP communicate.BEnables the IPSec protocol on internal workstations.CPacket-based detection and prevention of network attacks.DSingle mode IP communication for a fiber line between remote sites.

单选题
A network IPS provides which of the following?()
A

The layer 3 protocol on which other protocols like TCP and UDP communicate.

B

Enables the IPSec protocol on internal workstations.

C

Packet-based detection and prevention of network attacks.

D

Single mode IP communication for a fiber line between remote sites.


参考解析

解析: 暂无解析

相关考题:

Session affinity is a feature of which of the following devices?() A. DNS serverB. DHCP serverC. Load balancerD. IPS

A technician needs to ensure that a specific application on a single home user‘s computerreceives Internet traffic reliably. The home network provides access to three other users and theapplication relies on a specific protocol.Which of the following should the technician use?()A. DHCPB. PATC. ProxyD. IPX

A network IPS provides which of the following?() A. The layer 3 protocol on which other protocols like TCP and UDP communicate.B. Enables the IPSec protocol on internal workstations.C. Packet-based detection and prevention of network attacks.D. Single mode IP communication for a fiber line between remote sites.

Which two are characteristics of the IS -IS protocol but not OSPF?() A. forms adjacencies with all neighborsB. supports demand circuit routingC. provides routing support for multiple network layer protocolsD. utilizes SPF algorithmE. provides for network scalability by allowing the network to be separated into areasF. three layers of hierarchical routing

Which two of these are characteristics of an IPS device?() A. passively listens to network trafficB. is an active device in the traffic pathC. has a permissive interface that is used to monitor networksD. traffic arrives on one IPS interface and exits on another

Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent

Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.

Which of the following is the advantage of Server to Server replication in a cluster environment over Disk to Disk?()A、Reduced network trafficB、Frequent BIOS updates are not requiredC、Backup agent does not need to be installedD、Provides greater overall fault tolerance

Which of the following laptop displays would provide the BEST viewing angle?()A、IPS LCDB、TFT LCDC、DLPD、Plasma

A network administrator provides an IP address of 128.135.0.142 and a subnet mask of 255.0.0.0.  Once a ping is attempted, it fails.  Which of the following options is the most probable cause of the failed ping?()A、0 is not valid in an IP addressB、128 is a reserved networkC、The subnet mask should be 255.255.0.0. since it is a class BD、A network problem has occurred since IP and subnet are valid

Which of the following commands restarts a TCP/IP subsystem that provides network services  ()A、refresh -s inetdB、refresh -s tcpipC、/etc/rc.tcpip efreshD、refresh -g inetd

Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

Which two are characteristics of the IS -IS protocol but not OSPF?()A、forms adjacencies with all neighborsB、supports demand circuit routingC、provides routing support for multiple network layer protocolsD、utilizes SPF algorithmE、provides for network scalability by allowing the network to be separated into areasF、three layers of hierarchical routing

A network IPS provides which of the following?()A、The layer 3 protocol on which other protocols like TCP and UDP communicate.B、Enables the IPSec protocol on internal workstations.C、Packet-based detection and prevention of network attacks.D、Single mode IP communication for a fiber line between remote sites.

Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.

Session affinity is a feature of which of the following devices?()A、DNS serverB、DHCP serverC、Load balancerD、IPS

Which of the following provides the MOST redundancy for a corporate server network?()A、Server-to-server replicationB、Server clusteringC、Hot siteD、Disk-to-disk replication

A technician needs to ensure that a specific application on a single home user's computer receives Internet traffic reliably. The home network provides access to three other users and the application relies on a specific protocol. Which of the following should the technician use?()A、DHCPB、PATC、ProxyD、IPX

Which of the following server roles provides a common time to all computers?()A、NTPB、SNMPC、SMTPD、RAS

单选题Which of the following commands restarts a TCP/IP subsystem that provides network services  ()Arefresh -s inetdBrefresh -s tcpipC/etc/rc.tcpip efreshDrefresh -g inetd

单选题Which of the following provides the MOST redundancy for a corporate server network?()A Server-to-server replicationB Server clusteringC Hot siteD Disk-to-disk replication

多选题Which of the following is true about the Cisco IOS-IPS functionality? ()AThe signatures available are built into the IOS code.BToupdate signatures youneed to install a new IOS imageCTo activate new signatures you download a new Signature DefiitionFile (SDF) from Cisco’s web siteDLoading and enabling selected IPS signatures is user configurableECisco IOS onlyprovides Intrusion Detection functionalityFCisco IOS-IPS requires a network module installed in your router running sensor software

单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()A No vulnerable applications or operating systemsB No viruses or wormsC Appropriate security applications and patch levelsD Current IPS signaturesE Cisco Security Agent

多选题Which two of these are characteristics of an IPS device?()Apassively listens to network trafficBis an active device in the traffic pathChas a permissive interface that is used to monitor networksDtraffic arrives on one IPS interface and exits on another

多选题Based on the following items, which two types of interfaces are found on all network-based IPS sensors?()ALoopback interfaceBCommand and control interfaceCMonitoring interfaceDManagement interface

单选题Conducting a project kick-off in the plan phase provides which of the following customer benefits? Select exactly 1 answer(s) from the following:()。Aensure that it receives detailed network diagramsBreduce the risk of downtime due to facilities-related problemsCensure end-user support immediately after the launch of a new systemDconfirm project roles and responsibilities, as well as milestone dates

单选题Which of the following provides a logical grouping of database objects?()AViewBTableCSchemaDBuffer pool