多项选择题
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
相关考题
-
单项选择题
UsersattheCharlevilleCompanybeganexperiencinghighnetworkdelayswhenInternetconnectivitywasenabledforallusers.Afterinvestigatingthetrafficflow,youdeterminethatpeer-to-peertrafficfromamusicdownloadsiteisconsumingalargeamountofbandwidth.WhichQoSmechanismcanyouimplementtoimprovethenetworkresponsetime?()
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. -
多项选择题
WhichtwoofthesekeyfieldsareusedtoidentifyaflowinatraditionalNetFlowimplementation?()
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address -
多项选择题
TheSchuylerandLivingstonIronWorkshasbeenworkingongettingitsnetworksecurityundercontrol.IthassetupVPNwithIPSeclinkstoitssuppliers.Ithasinstallednetworkvulnerabilityscannerstoproactivelyidentifyareasofweakness,anditmonitorsandrespondstosecurityeventsastheyoccur.Italsoemploysextensiveaccesscontrollists,statefulfirewall implementations,anddedicatedfirewallappliances.Thecompanyhasbeengrowingveryfastlatelyandwantstomakesureitisuptodateonsecuritymeasures.Whichtwoareasofsecuritywouldyouadvisethecompanytostrengthen?()
A. intrusion protection
B. identity
C. secure connectivity
D. security management
