Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
第1题:
Which statement about WSA access logs that are to be processed by sawmill for cisco ironport istrue?()
第2题:
vPath is a critical component in the VNS architecture. Which two are functions of vPath?()
第3题:
Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()
第4题:
Which two statements are true about the Oracle Enterprise Manager (OEM) ?()
第5题:
The cisco ironport portfolio performs which service?()
第6题:
The (1) is a general description of the architecture of a workflow management system used by the WFMC, in which the main components and the associated interfaces are summarized. The workflow enactment service is the heart of a workflow system which consists of several (2). 空白(1)处填()
第7题:
Which of the following enables a Windows 2000 server to assign IP addresses?()
第8题:
Which class-of-service component allows you to define the bandwidth allocated to different traffic types?()
第9题:
terminating PPP sessions at the service provider
PPP framing
PPP multiplexing
GRE tunneling
L2TP tunneling
第10题:
SenderBase
TrafMon
IronPort M-Series
E-Base
第11题:
file type
file size
file age
file name
第12题:
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
第13题:
In PPPoA architecture, which two methods are most commonly deployed?()
第14题:
What is meant by the term "firewall sandwich"?()
第15题:
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()
第16题:
By which ways does remote monitoring allow the monitored call to be selected?()
第17题:
Which enables a Windows 2000 server to assign IP addresses?()
第18题:
Which two statements are true for a security policy? ()(Choose two.)
第19题:
Service Focal Point, Inventory Scout, and DLPAR rely on correct setup and networking between the HMC and the logical partitions. Which authentication method is used to control session management, but also authentication between network peers?()
第20题:
the default log format can be used
the fields%XC%X n must be appended to the default access log format
any log format can beused , but all WSAs must use the same format
any log format can be used. And different WSAs may use different formats
第21题:
intelligent traffic steering to the VSG
offloading the processing from the VSG to the VEM
intelligent traffic steering to the VNMC
offloading the processing from the VSG to the flow manager
deep packet inspection
第22题:
multiple layers of firewalling
a method of operating firewalls from multiple vendors
firewall connections in either an active or standby state
an architecture in which all traffic between firewalls goes through application-specific servers
an architecture in which all traffic between firewalls goes through application-specific gateways