单选题In base e-Commerce module designs, where should firewall perimeters be placed? ()A core layerB Internet boundaryC aggregation layerD aggregation and core layersE access and aggregation layers

单选题
In base e-Commerce module designs, where should firewall perimeters be placed? ()
A

 core layer

B

 Internet boundary

C

 aggregation layer

D

 aggregation and core layers

E

 access and aggregation layers


参考解析

解析: 暂无解析

相关考题:

One should always _____ facts. A、base one's opinion onB、base one's opinion inC、base one opinion onD、base one opinion in

Referring to the exhibit, you are asked to rate-limit traffic from Web-Server to the subnet where Mal-User is located. All other traffic should be permitted. Which firewall filter configuration do you use?()A.B.C.D.

Referring to the exhibit, you want to block HTTP access to Web-Server from the subnet where Mal-User is located. All other traffic should be permitted.Which firewall filter configuration do you use?() A.B.C.D.

What is the purpose of unicast reverse path forwarding?() A. to validate packet receipt on interfaces where the traffic should be receivedB. to forward packets out the interfaces where the traffic should be receivedC. to forward packets out the interfaces where the traffic should be sentD. to validate packet receipt on interfaces where the traffic should be sent

Where should you install the spare line module in a redundancy group?() A.last slot in the chassisB.first slot in the chassisC.lowest numbered slot in thegroupD.highest numbered slot in the group

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() A. FWSM routes traffic between the VLANs.B. FWSM switches traffic between the VLANs.C. Transparent mode is often called bump-in-the-wire mode.D. Transparent mode firewall deployments are used most often in current designs.E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.

In a base e-Commerce module design, which routing statement is correct?() A. Routing is mostly static.B. Hardcoded IP addresses are used to support failover.C. Inbound servers use the CSM or ACE as the default gateway.D. VLANs between the access layer switches are used for FHRP protocols.

In base e-Commerce module designs, where should firewall perimeters be placed?() A. core layerB. Internet boundaryC. aggregation layerD. aggregation and core layersE. access and aggregation layers

When BGP tuning is used, how is packet flow into the e-commerce module controlled?()A、by tracking the status of objects along the path to the e-commerce moduleB、by detecting undesirable conditions along the path to the e-commerce moduleC、by using the MED to communicate the site preferences for traffic to multiple ISPsD、by communicating the available prefixes, routing policies, and preferences of each site to its ISPE、by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

What is the logistics base module? ()A、1200*1000mmB、2591*2438mmC、600*400mmD、A, B and C

You are configuring an 802.1Q trunk between a Layer 2 switch and a firewall. You read in the documentation that the best way to set up a trunk is to set the port as dynamic desirable. The trunk is not coming up. Which one of these options would be a valid explanation? ()A、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode ONB、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode to OFFC、The firewall does not support Cisco Discovery Protocol. You should set the switchport trunk mode asauto.D、The firewall does not support DTP. You should set the switchport trunk mode to ON

What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

In a base e-Commerce module design, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

In base e-Commerce module designs, where should firewall perimeters be placed? ()A、 core layerB、 Internet boundaryC、 aggregation layerD、 aggregation and core layersE、 access and aggregation layers

A customer is considering an Intel processor-based blade solution from a competitor. The customer is willing to share only the information that the competitor offers 96 Xeon processors per rack.  Which of the following IBM BladeCenter E benefits should the Sales Specialist emphasize first?()A、Redundant BlowersB、Availability of AMD and Intel ProcessorsC、Processor densityD、Advanced Management Module

What is the purpose of unicast reverse path forwarding?()A、to validate packet receipt on interfaces where the traffic should be receivedB、to forward packets out the interfaces where the traffic should be receivedC、to forward packets out the interfaces where the traffic should be sentD、to validate packet receipt on interfaces where the traffic should be sent

Where is the IS-IS Network Entity Title configured?()A、per IP interfaceB、per virtual routerC、only on LAN interfacesD、only on WAN interfaces

You write a procedure that will be called from two level triggers and a database trigger. Where should you store this code? ()A、On the Oracle server. B、Locally in each form module. C、In an attached PL/SQL library D、On your file network server.

单选题What is a virtual firewall?()Aanother name for a firewall deployed in routed modeBanother name for a firewall deployed in transparent modeCa separation of multiple firewall security contexts on a single firewallDa firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextEa firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

单选题On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()AsshBconnectCloginDsession

单选题When BGP tuning is used, how is packet flow into the e-commerce module controlled?()Aby tracking the status of objects along the path to the e-commerce moduleBby detecting undesirable conditions along the path to the e-commerce moduleCby using the MED to communicate the site preferences for traffic to multiple ISPsDby communicating the available prefixes, routing policies, and preferences of each site to its ISPEby moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

单选题You write a procedure that will be called from two level triggers and a database trigger. Where should you store this code? ()AOn the Oracle server. BLocally in each form module. CIn an attached PL/SQL library DOn your file network server.

单选题Where should you install the spare line module in a redundancy group?()Alast slot in the chassisBfirst slot in the chassisClowest numbered slot in thegroupDhighest numbered slot in the group

单选题The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A another name for a firewall deployed in routed modeB another name for a firewall deployed in transparent modeC a separation of multiple firewall security contexts on a single firewallD a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

单选题In base e-Commerce module designs, where should firewall perimeters be placed?()Acore layerBInternet boundaryCaggregation layerDaggregation and core layersEaccess and aggregation layers

单选题In a base e-Commerce module design, which routing statement is correct?()A Routing is mostly static.B Hardcoded IP addresses are used to support failover.C Inbound servers use the CSM or ACE as the default gateway.D VLANs between the access layer switches are used for FHRP protocols.

单选题The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()Aanother name for a firewall deployed in routed modeBanother name for a firewall deployed in transparent modeCa separation of multiple firewall security contexts on a single firewallDa firewall that, when deployed in routed mode, can support up to 1000 VLANs per context