A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection
第1题:
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()
第2题:
Which two statements are correct about firewall filters in the Junos OS?()
第3题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第4题:
Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()
第5题:
What is the recommended practice when considering VPN termination and firewall placement?()
第6题:
As an experienced technician, you are responsible for Technical Support. One of the trainees isasking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
第7题:
Which two statements are true regarding firewall user authentication?()
第8题:
inline with a firewall
in a DMZ outside the firewall
parallel with a firewall
in a DMZ behind the firewall
第9题:
CiscoWorks Security Device Management Center (SD/MC)
Security Device Manager (SDM)
Adaptive Security Device Manager (ASDM)
CiscoWorks VMS/Management Center (VMS/MC)
第10题:
Firewall filters are stateless.
Firewall filters are used to control routing information that is exchanged between devices.
Firewall filters are used to control traffic passing through the device.
Firewall filters can only be applied to traffic entering the device.
第11题:
high scalability
the design supports a layered security model
firewall addressing does not need to change
IPsec decrypted traffic is inspected by the firewall
there is a centralized point for logging and content inspection
第12题:
fewer devices to manage
moderate-to-high scalability
stateful inspection of decrypted VPN traffic
increased bandwidth with additional interfaces
decreased complexity as traffic is filtered from the firewall
第13题:
Which two actions protect a resource file from direct HTTP access within a web application?()
第14题:
A traditional router is better suited than a firewall device for which function?()
第15题:
Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
第16题:
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
第17题:
Which two of these are advantages of placing the VPN device parallel to the firewall?()
第18题:
Which data synchronization options between two geographical locations are supported by PowerHA SystemMirror?()
第19题:
You are designing the IP address assignment strategy for the VPN users. Which two actions should you perform.()
第20题:
onboard VPN accelerator
events correlation and proactive response
high-performance AIM VPN modules
virtual firewall
Cisco lOS Firewall and lOS IPS
transparent firewall
第21题:
inline with a firewall
in a DMZ outside the firewall
parallel with a firewall
in a DMZ behind the firewall
第22题:
When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第23题:
have the firewall and VPN appliance deployed in parallel
place the VPN in line with the firewall, with the VPN terminating inside the firewall
place the public side of the VPN termination device in the DMZ behind a firewall
place the VPN in line with the firewall, with the VPN terminating outside the firewall