其他

Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?()A.MARSB.NACC.VPND.IPS

题目
Which cisco security product line uses deep inspection to identify and prevent malicious attacks, resource misuse, and unauthorized access?()

A.MARS

B.NAC

C.VPN

D.IPS

参考答案和解析
参考答案:D
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

The cisco ironport portfolio performs which service?()

A.reduces the downtime that is asassocoated with spam,viruses,and blended threats that are delivered via email

B.determines if A user or device is authorized to access A switch port

C.defends the penmeter from malicious users and unauthorized traffic

D.provides A secure communication path through the internet


参考答案:A

第2题:

Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

A.complex
B.unique
C.catchy
D.long

答案:B
解析:
网络安全概念。

第3题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?

A.To prevent unauthorized hosts from getting access to the LAN

B.To limit the number of Layer 2 broadcasts on a particular switch port

C.To prevent unauthorized Telnet or SSH access to a switch port

D.To prevent the IP and MAC address of the switch and associated ports

E.None of the above


正确答案:A
解析:Explanation:
You can use the port security feature to restrict input to an interface by limiting and identifying MAC addresses of the stations allowed to access the port. When you assign secure MAC addresses to a secure port, the port does not forward packets with source addresses outside the group of defined addresses. If you limit the number of secure MAC addresses to one and assign a single secure MAC address, the workstation attached to that port is assured the full bandwidth of the port.

If a port is configured as a secure port and the maximum number of secure MAC addresses is reached, when the MAC address of a station attempting to access the port is different from any of the identified secure MAC addresses, a security violation occurs. Also, if a station with a secure MAC address configured or learned on one secure port attempts to access another secure port, a violation is flagged.

第4题:

Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?()

  • A、IPsec site-to-site VPN
  • B、Cisco AutoSecure
  • C、Cisco IOS Firewall
  • D、IPS

正确答案:C

第5题:

Why would a network administrator configure port security on a switch?()

  • A、To prevent unauthorized Telnet access to a switch port.
  • B、To limit the number of Layer 2 broadcasts on a particular switch port.
  • C、To prevent unauthorized hosts from accessing the LAN.
  • D、To protect the IP and MAC address of the switch and associated ports.
  • E、To block unauthorized access to the switch management interfaces over common TCP ports.

正确答案:C

第6题:

Why would a network administrator configure port security on a switch()。

A.to prevent unauthorized Telnet access to a switch port

B.to limit the number of Layer 2 broadcasts on a particular switch port

C.to prevent unauthorized hosts from accessing the LAN

D.to protect the IP and MAC address of the switch and associated ports

E.to block unauthorized access to the switch management interfaces over common TCP ports


参考答案:C

第7题:

What are two characteristics of the SDM Security Audit wizard?()

  • A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement
  • B、has two modes of operationinteractive and non-interactive
  • C、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router
  • D、uses interactive dialogs and prompts to implement role-based CLI
  • E、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

正确答案:A,E

第8题:

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()

A.IDS

B.VPN

C.NIPS

D.HIDS


参考答案:C

第9题:

Why would a network administrator configure port security on a switch?()

  • A、to prevent unauthorized Telnet access to a switch port
  • B、to limit the number of Layer 2 broadcasts on a particular switch port
  • C、to prevent unauthorized hosts from accessing the LAN
  • D、to protect the IP and MAC address of the switch and associated ports
  • E、to block unauthorized access to the switch management interfaces over common TCP ports

正确答案:C

第10题:

Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()

  • A、Cisco Firewall Services Module (FWSM)
  • B、Cisco Secure Access Control Server (ACS)
  • C、Cisco Private Internet Exchange (PIX) Firewall
  • D、Cisco Internetwork Operating System (IOS) Firewall

正确答案:D

更多相关问题