单选题Which of the following devices can be installed on individual computers throughout the network?()ANIPSBNetwork-based firewallCVPN concentratorDHost-based firewall

单选题
Which of the following devices can be installed on individual computers throughout the network?()
A

NIPS

B

Network-based firewall

C

VPN concentrator

D

Host-based firewall


参考解析

解析: 暂无解析

相关考题:

Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?() A.NASB.FirewallC.HubD.Bridge

Which of the following devices would need to be configured to block specific ports and protocols from entering the network?() A. BridgeB. FirewallC. Port replicatorD. Gateway

A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?() A. Unmanaged switchB. Hardware firewallC. HubD. Managed switch

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall

As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A. inline with a firewallB. in a DMZ outside the firewallC. parallel with a firewallD. in a DMZ behind the firewall

Which is the main difference between host-based and network-based intrusion prevention?()A、Host-based IPS can work in promiscuous mode or inline mode.B、Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.C、Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.D、Host-based IPS deployment requires less planning than network-based IPS.

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

Which of the following is the BEST way to deny unauthorized computers access to a network? ()A、Disable DHCP.B、Use MAC filtering.C、Disable the SSID broadcast.D、Use a network firewall.

Your company has a single active directory domain. The company network is protected by a firewall. Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: Error 721: The remote computer is not responding. You need to ensure that users can establish a VPN connection. What should you do? ()A、Open port 1423 on the firewallB、Open port 1723 on the firewallC、Open port 3389 on the firewallD、Open port 6000 on the firewall

What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A、 inline with a firewallB、 in a DMZ outside the firewallC、 parallel with a firewallD、 in a DMZ behind the firewall

Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A、SwitchB、RepeaterC、HubD、WAP

Which of the following features can be identically configured on a wireless access point and in the wireless network OS settings?()A、The firewall settingsB、The DHCP addressC、The workgroup nameD、The SSID

A network at a small business utilizes a star topology and is experiencing frequent collisionsamong data packets. Which of the following devices is MOST likely being used?()A、Unmanaged switchB、Hardware firewallC、HubD、Managed switch

Which of the following network devices uses NAT to convert private IP addresses into public IPaddresses?()A、NASB、FirewallC、HubD、Bridge

Which of the following network devices should be installed at a data center to intelligently distribute client connections to a pool of servers?()A、A proxy serverB、A load balancerC、A layer two switchD、A multilayer switch

Which of the following devices can be installed on individual computers throughout the network?()A、NIPSB、Network-based firewallC、VPN concentratorD、Host-based firewall

Which of the following devices would need to be configured to block specific ports and protocols from entering the network?()A、BridgeB、FirewallC、Port replicatorD、Gateway

You work as a senior administrator at ABC.com. The ABC.com network consists of a single domain named ABC.com. All servers on the ABC.com network have Windows Server 2012 R2 installed.  You are running a training exercise for junior administrators. You are currently discussing the Windows Firewall with Advanced Security feature.  Which of the following is TRUE with regards to Windows Firewall with Advanced Security?()A、It provides host-based,two-way network traffic filtering for a computer.B、It provides host-based,one-way network traffic filtering for a computer.C、It blocks unauthorized network traffic flowing into or out of the local computer.D、It only blocks unauthorized network traffic flowing into the local computer.E、It only blocks unauthorized network traffic flowing out of the local computer.

单选题Which of the following is the BEST way to deny unauthorized computers access to a network? ()ADisable DHCP.BUse MAC filtering.CDisable the SSID broadcast.DUse a network firewall.

单选题Which Cisco product family can simultaneously implement firewall, VPN, content security, network access control, virtualization, anD content filtering?()Aintrusion prevention systemsBcatalyst switchesCadaptive security appliancesDprotect link gateway

单选题Which is the main difference between host-based and network-based intrusion prevention?()AHost-based IPS can work in promiscuous mode or inline mode.BNetwork-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.CNetwork-based IPS is better suited for inspection of SSL and TLS encrypted data flows.DHost-based IPS deployment requires less planning than network-based IPS.

单选题Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()ASwitchBRepeaterCHubDWAP

单选题Your company has a single Active Directory domain. The company network is protected by a firewall.Remote users connect to your network through a VPN server by using PPTP. When the users try to connect to the VPN server, they receive the following error message: °Error 721: The remote computer is not responding.You need to ensure that users can establish a VPN connection. What should you do?()AOpen port 1423 on the firewall.BOpen port 1723 on the firewall.COpen port 3389 on the firewall.DOpen port 6000 on the firewall.

单选题What is the recommended practice when considering VPN termination and firewall placement?()A have the firewall and VPN appliance deployed in parallelB place the VPN in line with the firewall, with the VPN terminating inside the firewallC place the public side of the VPN termination device in the DMZ behind a firewallD place the VPN in line with the firewall, with the VPN terminating outside the firewall

单选题Which of the following network devices should be installed at a data center to intelligently distribute client connections to a pool of servers?()AA proxy serverBA load balancerCA layer two switchDA multilayer switch

单选题As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()A inline with a firewallB in a DMZ outside the firewallC parallel with a firewallD in a DMZ behind the firewall

单选题Which of the following devices can be installed on individual computers throughout the network?()ANIPSBNetwork-based firewallCVPN concentratorDHost-based firewall