网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What is a virtual firewall?()
A

another name for a firewall deployed in routed mode

B

another name for a firewall deployed in transparent mode

C

a separation of multiple firewall security contexts on a single firewall

D

a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

E

a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)


参考答案

参考解析
解析: 暂无解析
更多 “单选题What is a virtual firewall?()A another name for a firewall deployed in routed modeB another name for a firewall deployed in transparent modeC a separation of multiple firewall security contexts on a single firewallD a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)” 相关考题
考题 What is the default action for firewall filters?() A. acceptB. rejectC. discardD. log

考题 What is the recommended practice when considering VPN termination and firewall placement?() A. have the firewall and VPN appliance deployed in parallelB. place the VPN in line with the firewall, with the VPN terminating inside the firewallC. place the public side of the VPN termination device in the DMZ behind a firewallD. place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 What is one benefit of the Cisco anti-X defense strategy?()A、 applications securityB、 virtual firewall protectionC、 security events correlation for proactive responseD、 malware, virus, and worm mitigation

考题 It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A、 single layer of firewallingB、 multiple layers of firewallingC、 firewall connections in either an active or standby stateD、 an architecture in which all traffic between firewalls goes through application-specific servers

考题 What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksB、 automatic reconfiguration s of the security devices based on current security threatsC、 containment and control of security threatsD、 application securityE、 anti-x defense F- virtual firewall

考题 What are three firewall filter terminating actions?()A、acceptB、logC、rejectD、discardE、drop

考题 Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()A、 onboard VPN acceleratorB、 events correlation and proactive responseC、 high-performance AIM VPN modulesD、 virtual firewallE、 Cisco lOS Firewall and lOS IPSF、 transparent firewall

考题 ()is not a physical wall, but a lot of virtual data to protect the computer network. A、Data wallB、Data ChannelC、Data baseD、firewall

考题 () is not a physical wall, but a lot of virtual data to protect the computer network.A、Date wallB、Date channelC、DatabaseD、Firewall

考题 What is the recommended practice when considering VPN termination and firewall placement?()A、 have the firewall and VPN appliance deployed in parallelB、 place the VPN in line with the firewall, with the VPN terminating inside the firewallC、 place the public side of the VPN termination device in the DMZ behind a firewallD、 place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

考题 A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A、The application server,firewall,and database server on the same VLANB、The application server and firewall on one VLAN,and the database server on a second VLANC、The application server on one VLAN,and the database server and firewall on a second VLAND、The application server and firewall on one VLAN,and the firewall and database server on a second VLAN

考题 What is the function of Host Checker?()A、To allow clientless access to the networkB、To restrict access to protected resources on the networkC、To scan an endpointfor compliance with security policiesD、To push a firewall policy to the endpoint's local firewall application

考题 Your company has an Active Directory Domain Services (AD DS) domain. All servers run Windows Server 2008 R2. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server and a Remote Desktop Gateway (RD Gateway) server. You use Windows Firewall on your servers. You need to ensure that users can connect to their virtual desktops. What should you do?()A、Create a Windows Firewall inbound rule for port 443 on the RD Gateway server.B、Create a Windows Firewall inbound rule for port 443 on the RD Session Host server.C、Create a Windows Firewall inbound rule for port 3389 on the RD Gateway server.D、Create a Windows Firewall inbound rule for port 3389 on the RD Session Host server.

考题 You plan to deploy a Virtual Desktop Infrastructure (VDI). You need to ensure that all of the changes made to the virtual machines (VMs) in the VDI are discarded when users log off of their session. What should you include in the deployment?()A、mandatory profilesB、a virtual desktop poolC、roaming profilesD、personal virtual desktops

考题 单选题Your environment includes Hyper-V and VMware ESX. You manage your virtual environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You plan to perform a virtual-tovirtual (V2V) conversion of a virtual machine (VM) that is located on the ESX server. You start the conversion by using the Convert Virtual Machine Wizard. Communication between the destination host and the ESX server fails, and the conversion does not finish successfully. You need to ensure that the conversion finishes successfully.  What should you change?()A WSMan permissions and settingsB Server Message Block (SMB) settingsC Secure Shell (SSH) and HTTPS settingsD Windows Firewall exceptions for Background Intelligent Transfer Service (BITS)

考题 单选题What is the traditional mode for a firewall?()A routed modeB context modeC bridged modeD transparent modeE full security mode

考题 多选题What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()Ausing QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacksBautomatic reconfiguration s of the security devices based on current security threatsCcontainment and control of security threatsDapplication securityEanti-x defense F- virtual firewall

考题 单选题What is the default action for firewall filters?()A acceptB rejectC discardD log

考题 多选题Your company has a main office and 10 branch offices. The main office has a firewall. All connections from the branch office are sent through the firewall. Each office has two Hyper-V hosts that run Windows Server 2008 R2 Service Pack 1 (SP1). Each host contains 10 virtual machines (VMs). You deploy Microsoft System Center Virtual Machine Manager 2008 R2 in the main office. You need to recommend changes to the firewall to ensure that branch office administrators can manage their local Hyper-V hosts by using System Center Virtual Machine Manager. The solution must ensure that only the required ports are opened. Which firewall ports should you recommend opening?()A135B443C80D8100E995

考题 单选题A user has an application server LPAR with a physical Ethernet adapter. They want to have a database LPAR also connected to the application LPAR via virtual Ethernet. Their security policies require a firewall between the application LPAR and database LPAR. Which of the following virtual Ethernet configurations satisfies the customer’s requirements?()A The application server,firewall,and database server on the same VLANB The application server and firewall on one VLAN,and the database server on a second VLANC The application server on one VLAN,and the database server and firewall on a second VLAND The application server and firewall on one VLAN,and the firewall and database server on a second VLAN

考题 单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A  single layer of firewallingB  multiple layers of firewallingC  firewall connections in either an active or standby stateD  an architecture in which all traffic between firewalls goes through application-specific servers

考题 单选题The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A  another name for a firewall deployed in routed modeB  another name for a firewall deployed in transparent modeC  a separation of multiple firewall security contexts on a single firewallD  a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

考题 单选题What is the recommended practice when considering VPN termination and firewall placement?()A  have the firewall and VPN appliance deployed in parallelB  place the VPN in line with the firewall, with the VPN terminating inside the firewallC  place the public side of the VPN termination device in the DMZ behind a firewallD  place the VPN in line with the firewall, with the VPN terminating outside the firewall

考题 单选题The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()A another name for a firewall deployed in routed modeB another name for a firewall deployed in transparent modeC a separation of multiple firewall security contexts on a single firewallD a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

考题 单选题What is one benefit of the Cisco anti-X defense strategy?()A  applications securityB  virtual firewall protectionC  security events correlation for proactive responseD  malware, virus, and worm mitigation

考题 多选题What are three terminating actions for firewall filters?()ArejectBdropCpermitDacceptEdiscard