网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which feature is a potential security weakness of a traditional stateful firewall?()
A

It cannot support UDP flows.

B

It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.

C

It cannot detect application-layer attacks.

D

The status of TCP sessions is retained in the state table after the sessions terminate.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which feature is a potential security weakness of a traditional stateful firewall?()A It cannot support UDP flows.B It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.C It cannot detect application-layer attacks.D The status of TCP sessions is retained in the state table after the sessions terminate.” 相关考题
考题 你们需要安保专家对场馆做安全评估吗?A.Do you need a security expert to value the potential danger of the region?B.Do you need a security expert to calculate the potential adventure of the area?C.Do you need a security expert to account the potential risks of the region?D.Do you need a security expert to evaluate the potential risks of the place?

考题 Which type of deployment utilizes ISRs with Cisco IOS Security feature sets to provide an ideal, low-cost, yet capable and powerful platform?() A.Financial deploymentsB.Medium deploymentsC.Large deploymentsD.Commercial deploymentsE.Small deployments

考题 The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

考题 What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

考题 When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

考题 The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()A、 security contextsB、- transparent firewallC、 WebVPND、 Active/Active failoverE、 low latency queuingF、 AIP-SSM intrusion prevention

考题 Which feature is a potential security weakness of a traditional stateful firewall?()A、It cannot support UDP flows.B、It cannot ensure each TCP connection follows a legitimate TCP three-way handshake.C、It cannot detect application-layer attacks.D、The status of TCP sessions is retained in the state table after the sessions terminate.

考题 RMAN provides more granular catalog security through which feature?()A、Virtual private databaseB、Virtual private catalogC、RMAN virtual databaseD、RMAN secure catalogE、Oracle Database Vault

考题 The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()A、 intrusion protectionB、 identityC、 secure connectivityD、 security management

考题 The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

考题 Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A、 WebVPN for SSLB、 IPSecC、 AIMD、 Stateful packet inspection

考题 What is an ideal Cisco solution to protect a campus network and services from potential security breaches?()A、Cisco Security Device ManagerB、Cisco Security AgentC、Cisco VPN ClientD、Cisco Intrusion Detection System

考题 Which feature would prevent guest users from gaining network access by unplugging an IP phone and connecting a laptop computer?()A、IPSec VPNB、SSL VPNC、port securityD、port security with statically configured MAC addressesE、private VLANs

考题 In the event that two devices need access to a common server, but they cannot communicate witheach other, which security feature should be configured to mitigate attacks between thesedevices?()A、private VLANsB、port securityC、BPDU guardD、dynamic ARP inspectionE、DHCP snooping

考题 Which type of deployment utilizes ISRs with Cisco IOS Security feature sets to provide an ideal, low-cost, yet capable and powerful platform?()A、Small deploymentsB、Large deploymentsC、Medium deploymentsD、Commercial deploymentsE、Financial deployments

考题 Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()A、 Cisco lOS Matrix NavigatorB、 Cisco Feature NavigatorC、 Cisco lOS Package PlannerD、 Cisco lOS Security PlannerE、 Cisco Dynamic Configuration Tool

考题 A tape drive containing a jammed tape must be taken off-site to be repaired. Which of the following should be considered FIRST?()A、Downtime necessary to reinstall the repaired driveB、Data security policies and proceduresC、Potential cooling problems due to the missing driveD、Redundant or replacement data backup solutions

考题 You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers

考题 多选题The PIX Security Appliance feature set is a subset of the ASA Security Appliance feature set. Which two of these features are only supported by an ASA Security Appliance? (Choose two.)()Asecurity contextsB- transparent firewallCWebVPNDActive/Active failoverElow latency queuingFAIP-SSM intrusion prevention

考题 单选题Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft?  ()A  WebVPN for SSLB  IPSecC  AIMD  Stateful packet inspection

考题 单选题A tape drive containing a jammed tape must be taken off-site to be repaired. Which of the following should be considered FIRST?()A  Downtime necessary to reinstall the repaired driveB  Data security policies and proceduresC  Potential cooling problems due to the missing driveD  Redundant or replacement data backup solutions

考题 多选题The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()Aintrusion protectionBidentityCsecure connectivityDsecurity management

考题 单选题The ISPS Code consists of a mandatory section-Part A, which shows()A the detailed security-related requirementsB guidelines to meet security-related requirementsC the detailed security-related requirements and the guidelines to meet themD how to run a shipping company considering the potential terrorism action

考题 单选题RMAN provides more granular catalog security through which feature?()A  Virtual private databaseB  Virtual private catalogC  RMAN virtual databaseD  RMAN secure catalogE  Oracle Database Vault

考题 单选题Which type of deployment utilizes ISRs with Cisco IOS Security feature sets to provide an ideal, low-cost, yet capable and powerful platform?()A Small deploymentsB Large deploymentsC Medium deploymentsD Commercial deploymentsE Financial deployments

考题 多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network

考题 多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates