Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()A、SenderBaseB、TrafMonC、IronPort M-SeriesD、E-Base

题目

Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()

  • A、SenderBase
  • B、TrafMon
  • C、IronPort M-Series
  • D、E-Base

相似考题
更多“Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()A、SenderBaseB、TrafMonC、IronPort M-SeriesD、E-Base”相关问题
  • 第1题:

    Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?() 

    • A、 the default log format can be used
    • B、 the fields"%XC%X n" must be appended to the default access log format
    • C、 any log format can beused , but all WSAs must use the same format
    • D、 any log format can be used. And different WSAs may use different formats

    正确答案:A

  • 第2题:

    vPath is a critical component in the VNS architecture. Which two are functions of vPath?()

    • A、 intelligent traffic steering to the VSG
    • B、 offloading the processing from the VSG to the VEM
    • C、 intelligent traffic steering to the VNMC
    • D、 offloading the processing from the VSG to the flow manager
    • E、 deep packet inspection

    正确答案:A,B

  • 第3题:

    Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()

    • A、ICMP Echo
    • B、VoIP (RTP)
    • C、IPX
    • D、SNMP

    正确答案:A,B

  • 第4题:

    Which two statements are true about the Oracle Enterprise Manager (OEM) ?()

    • A、 OEM can do management and monitoring across multiple WLS Domains
    • B、 OE is a unified solution for management and monitoring across entire architecture - Web Tier, App Tier & DB Tier
    • C、 OEM is focused solely on Oracle solutions, cannot manage 3rd party products
    • D、 OEM includes tools to configure the operating system

    正确答案:A,B

  • 第5题:

    The cisco ironport portfolio performs which service?()

    • A、reduces the downtime that is asassocoated with spam,viruses,and blended threats that are delivered via email
    • B、defends thepenmeter from malicious users and unauthorized traffic
    • C、providesA secure communication path through the internet
    • D、determines if a user or device is authorized to access a switch port

    正确答案:A

  • 第6题:

    The (1) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several (2). 空白(1)处填()

    • A、waterfallmodel
    • B、workflowreferencemodel
    • C、evolutionarymodel
    • D、spiralmodel

    正确答案:B

  • 第7题:

    Which of the following enables a Windows 2000 server to assign IP addresses?()

    • A、WINS (windows internet name service)
    • B、DHCP
    • C、DNS
    • D、IIS

    正确答案:B

  • 第8题:

    Which class-of-service component allows you to define the bandwidth allocated to different traffic types?()

    • A、classificatoin
    • B、rewrite marking
    • C、scheduling
    • D、queueing

    正确答案:C

  • 第9题:

    多选题
    In PPPoA architecture, which two methods are most commonly deployed?()
    A

    terminating PPP sessions at the service provider

    B

    PPP framing

    C

    PPP multiplexing

    D

    GRE tunneling

    E

    L2TP tunneling


    正确答案: B,E
    解析: 暂无解析

  • 第10题:

    单选题
    Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
    A

    SenderBase

    B

    TrafMon

    C

    IronPort M-Series

    D

    E-Base


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
    A

     file type

    B

     file size

    C

     file age

    D

     file  name


    正确答案: B
    解析: 暂无解析

  • 第12题:

    Which file characteristic cannot be used in the Cisco IronPort Data Security policies?() 

    • A、 file type
    • B、 file size
    • C、 file age
    • D、 file  name

    正确答案:C

  • 第13题:

    In PPPoA architecture, which two methods are most commonly deployed?()

    • A、terminating PPP sessions at the service provider
    • B、PPP framing
    • C、PPP multiplexing
    • D、GRE tunneling
    • E、L2TP tunneling

    正确答案:A,E

  • 第14题:

    What is meant by the term "firewall sandwich"?()

    • A、multiple layers of firewalling
    • B、a method of operating firewalls from multiple vendors
    • C、firewall connections in either an active or standby state
    • D、an architecture in which all traffic between firewalls goes through application-specific servers
    • E、an architecture in which all traffic between firewalls goes through application-specific gateways

    正确答案:A

  • 第15题:

    You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()

    • A、ICMP
    • B、SNMP
    • C、TCP
    • D、HTTPS

    正确答案:A,C

  • 第16题:

    By which ways does remote monitoring allow the monitored call to be selected?()

    • A、Agent Name  
    • B、Agent Extension  
    • C、application ID  
    • D、Media Group ID
    • E、CSQ ID  

    正确答案:B,E

  • 第17题:

    Which enables a Windows 2000 server to assign IP addresses?()

    • A、WINS(windows internet name service)
    • B、DHCP
    • C、DNS
    • D、IIS

    正确答案:B

  • 第18题:

    Which two statements are true for a security policy? ()(Choose two.)

    • A、It controls inter-zone traffic.
    • B、It controls intra-zone traffic.
    • C、It is named with a system-defined name.
    • D、It controls traffic destined to the device's ingress interface.

    正确答案:A,B

  • 第19题:

    Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()

    • A、Kerberos
    • B、Domain Name Server
    • C、Secure Sockets Layer
    • D、Resource Monitoring and Control

    正确答案:D

  • 第20题:

    单选题
    Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?()
    A

     the default log format can be used

    B

     the fields%XC%X n must be appended to the default access log format

    C

     any log format can beused , but all WSAs must use the same format

    D

     any log format can be used. And different WSAs may use different formats


    正确答案: A
    解析: 暂无解析

  • 第21题:

    多选题
    vPath is a critical component in the VNS architecture. Which two are functions of vPath?()
    A

    intelligent traffic steering to the VSG

    B

    offloading the processing from the VSG to the VEM

    C

    intelligent traffic steering to the VNMC

    D

    offloading the processing from the VSG to the flow manager

    E

    deep packet inspection


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    单选题
    What is meant by the term "firewall sandwich"?()
    A

    multiple layers of firewalling

    B

    a method of operating firewalls from multiple vendors

    C

    firewall connections in either an active or standby state

    D

    an architecture in which all traffic between firewalls goes through application-specific servers

    E

    an architecture in which all traffic between firewalls goes through application-specific gateways


    正确答案: C
    解析: 暂无解析