多选题Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()Afewer devices to manageBmoderate-to-high scalabilityCstateful inspection of decrypted VPN trafficDincreased bandwidth with additional interfacesEdecreased complexity as traffic is filtered from the firewall
多选题
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
A
fewer devices to manage
B
moderate-to-high scalability
C
stateful inspection of decrypted VPN traffic
D
increased bandwidth with additional interfaces
E
decreased complexity as traffic is filtered from the firewall
参考解析
解析:
暂无解析
相关考题:
Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.) A. IGP routes advertised by P routersB. IGP routes advertised by PE routersC. VPN routes advertised by PE routersD. VPN routes advertised by CE routers
Which two methods are used to assign an IP address to a WX device? ()(Choose two.) A. SSHB. TelnetC. WebViewD. device front panelE. serial console (command-line interface)
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?() A. fewer devices to manageB. moderate-to-high scalabilityC. stateful inspection of decrypted VPN trafficD. increased bandwidth with additional interfacesE. decreased complexity as traffic is filtered from the firewall
Which two of these are advantages of placing the VPN device parallel to the firewall?() A. high scalabilityB. the design supports a layered security modelC. firewall addressing does not need to changeD. IPsec decrypted traffic is inspected by the firewallE. there is a centralized point for logging and content inspection
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?() A.Cisco IOS IPsec/SSL VPN clientB.Cisco VPN ClinetC.ISDN terminal adapterD.Cisco Adaptive Security Appliance
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A、Broadband serviceB、Headend VPN deviceC、VPN access deviceD、Tunnel
Which two actions protect a resource file from direct HTTP access within a web application?()A、Placing it in the /secure directoryB、Placing it in the /WEB-INF directoryC、Placing it in the /META-INF/secure directoryD、Creating a element within the deployment descriptor
A traditional router is better suited than a firewall device for which function?()A、VPN establishmentB、packet-based forwardingC、stateful packet processingD、Network Address Translation
Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()A、Cisco IOS IPsec/SSL VPN clientB、Cisco VPN ClinetC、ISDN terminal adapterD、Cisco Adaptive Security Appliance
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()A、fewer devices to manageB、moderate-to-high scalabilityC、stateful inspection of decrypted VPN trafficD、increased bandwidth with additional interfacesE、decreased complexity as traffic is filtered from the firewall
Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A、 Cisco Integrated Service RoutersB、 Cisco ASA 5500 Series Security ApplianceC、 CiscoWebVPN Services ModuleD、 CiscoIPsec VPN Module
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system. Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()A、 has a permissive interface that is used to monitor networksB、 is an active device in the traffic pathC、 passively listens to network trafficD、 has a promiscuous interface that is used to monitor the network
In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking
Which two of these are advantages of placing the VPN device parallel to the firewall?()A、 high scalabilityB、 the design supports a layered security modelC、 firewall addressing does not need to changeD、 IPsec decrypted traffic is inspected by the firewallE、 there is a centralized point for logging and content inspection
Which two routes do P routers see by default in a BGP MPLS VPN configuration? ()(Choose two.)A、IGP routes advertised by P routersB、IGP routes advertised by PE routersC、VPN routes advertised by PE routersD、VPN routes advertised by CE routers
Which two methods are used to assign an IP address to a WX device? ()(Choose two.)A、SSHB、TelnetC、WebViewD、device front panelE、serial console (command-line interface)
Which two external authentication servers are supported for administrative access to a Junos device?()A、RADIUSB、LDAPC、ACED、TACACS+
You deploy mobile devices that run Microsoft Windows Mobile 5.0. A Microsoft Windows Server 2003 server that runs Routing and Remote Access is configured to allow virtual private network (VPN) connections that are as secure as possible. You need to connect the Windows Mobilebased devices to the VPN server. You also need to ensure that both ends of the VPN tunnel are authenticated. Which two actions should you perform?()A、Select L2TP/IPSec on each Windows Mobilebased device.B、Obtain and install a certificate on each Windows Mobilebased device.C、Configure the appropriate pre-shared key on each Windows Mobilebased device.D、Select Point-to-Point Tunneling Protocol (PPTP) on each Windows Mobilebased device.
多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices withtrunkingDbetween two Layer 2 devices withouttrunkingEbetween a Layer 2 device and a Layer 3 device withtrunking
多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus
多选题In which two locations in an enterprise network can an IPS sensor be placed?()Abridging VLANs on two switchesBbridging two VLANs on one switchCbetween two Layer 2 devices with trunkingDbetween two Layer 2 devices without trunkingEbetween a Layer 2 device and a Layer 3 device with trunking
多选题What are two advantages to customers with L2 MPLS VPNs? ()(Choose two.)AService provider has routing control.BCustomers control their own routing.CCan communicate protocols other than IP.DAllows them to use separate networks for IP and VPN traffic.
多选题Which two of these are advantages of placing the VPN device parallel to the firewall?()Ahigh scalabilityBthe design supports a layered security modelCfirewall addressing does not need to changeDIPsec decrypted traffic is inspected by the firewallEthere is a centralized point for logging and content inspection
单选题For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()ABroadband serviceBHeadend VPN deviceCVPN access deviceDTunnel
多选题Which of the following are common VPN transports? (Select TWO)()ARDPBVNCCSSLDPPTPERAS