A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
第1题:
A. Design 1 is a looped triangle design.
B. Design 2 is a looped triangle design.
C. Design 2 achieves quick convergence using RSTP.
D. Both designs supportstateful services at the aggregation layer.
E. Design 2 is the most widely deployed in enterprise data centers.
第2题:
IPS与IDS的区别是()
第3题:
Which statement about IDS/IPS design is correct?()
第4题:
关于IDS和IPS,说法正确的是()
第5题:
Which statement about an IPS is true?()
第6题:
Which statement is correct about the use of the virtual interface on a WLC ?()
第7题:
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
第8题:
IPS与IDS的职责都是保证网络安全,IPS注重接入控制,而IDS则进行网络监测。
第9题:
It compensates for the error caused by the vertical component of the Earth's magnetic field
It compensates for error caused by the heeling of a vessel
It compensates for quadrantal deviation
It is only needed in equatorial waters
第10题:
The IPS is in the traffic path.
Only one active interface is required.
Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.
When malicious traffic is detected,the IPS will only send an alert to a management station.
第11题:
Routing is mostly static.
Hardcoded IP addresses are used to support failover.
Inbound servers use the CSM or ACE as the default gateway.
VLANs between the access layer switches are used for FHRP protocols.
第12题:
A term must contain a from statement.
A term acts like if and then statements.
The most specific term has precedence.
Terms can be written in any order to achieve the same behavior.
第13题:
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
第14题:
As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()
第15题:
Which two statements about an IDS are true?()
第16题:
Which statement about data center access layer design modes is correct?()
第17题:
Which two statements describe the functions and operations of IDS and IPS systems?()
第18题:
In a base e-Commerce module design, which routing statement is correct?()
第19题:
Which statement about PPPoA configuration is correct?()
第20题:
Which statement is correct about a Routing Policy term?()
第21题:
An IPS should be deployed if the security policy does not support the denial of traffic.
An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
第22题:
The rules require vessels to comply with Traffic Separation Scheme regulations
The rules use the term safe speed
The Rules permit a stand-on vessel to take action prior to being in extremis
All of the above are correct
第23题:
The access layer is the first oversubscription point in a data center design.
When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.
第24题:
Used to relay DHCP messages
Used to communicate with LAPs
Used to bring up LWAPP tunnels
Used to extend into the wireless client VLAN