网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which statement about IDS/IPS design is correct?()
A

An IPS should be deployed if the security policy does not support the denial of traffic.

B

An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.

C

An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.

D

Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which statement about IDS/IPS design is correct?()A An IPS should be deployed if the security policy does not support the denial of traffic.B An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.” 相关考题
考题 ● Which statement about the preliminary design stage of a software development project is true? (75) .(75)A.The preliminary design is an internal document used only by programmersB.The preliminary design is the result of mapping product requirements info software and hardware functionsC.The preliminary design of the product comes from the requirement specificationD.The developers produce the preliminary design by defining the software structure in enough detail to permit coding

考题 Which statement is correct about the policy shown in the exhibit?() A. All routes are accepted.B. All routes are rejected.C. A 172.27.0.0/24 route will be accepted.D. A 172.27.0.0/16 route will be accepted.

考题 Which statement is correct about the forwarding table?() A. The forwarding table is stored only on the PFEB. The forwarding table contains all known routesC. The forwarding table is stored on both the RE and PFED. The forwarding table is stored only on the RE

考题 Which statement is correct about a Routing Policy term?() A.A term must contain a from statement.B.A term acts like if and then statements.C.The most specific term has precedence.D.Terms can be written in any order to achieve the same behavior.

考题 Refer to the exhibit. Which two statements about the topologies shown are correct?() A. Design 1 is a looped triangle design.B. Design 2 is a looped triangle design.C. Design 2 achieves quick convergence using RSTP.D. Both designs supportstateful services at the aggregation layer.E. Design 2 is the most widely deployed in enterprise data centers.

考题 In a base e-Commerce module design, which routing statement is correct?() A. Routing is mostly static.B. Hardcoded IP addresses are used to support failover.C. Inbound servers use the CSM or ACE as the default gateway.D. VLANs between the access layer switches are used for FHRP protocols.

考题 IPS与IDS的区别是()A、IDS是1种检测技术,IPS是一种阻断技术B、IDS并联在网络上的设备,IPS是串接在网络上的设备C、IPS属于审计类产品;IDS属于访问控制类产品D、IPS会检测并主动防御。而IDS却只会检测然后交由防火墙处理

考题 As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()A、 IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoringB、 IDS will stop malicious traffic from reaching its intended target for certain types of attacks.C、 IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)D、 IPS inspects traffic statefully and needs to see both sides of the connection to function properlyE、 IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information

考题 Which statement about IDS/IPS design is correct?()A、An IPS should be deployed if the security policy does not support the denial of traffic.B、An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C、An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D、Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

考题 Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.

考题 关于IDS和IPS,说法正确的是()A、IDS部署在网络边界,IPS部署在网络内部B、IDS适用于加密和交换环境,IPS不适用C、用户需要IDS日志定期查看,IPS不需要D、IDS部署在网络内部,IPS部署在网络边界

考题 Which statement about data center access layer design modes is correct?()A、The access layer is the first oversubscription point in a data center design.B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

考题 Which statement about an IPS is true?()A、The IPS is in the traffic path.B、Only one active interface is required.C、Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D、When malicious traffic is detected,the IPS will only send an alert to a management station.

考题 Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

考题 Which statement is correct about the use of the virtual interface on a WLC ?()A、 Used to relay DHCP messagesB、 Used to communicate with LAPsC、 Used to bring up LWAPP tunnelsD、 Used to extend into the wireless client VLAN

考题 In a base e-Commerce module design, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

考题 Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()A、Signature-based detectionB、Anomaly-based detectionC、Honey pot detectionD、Policy-based detection

考题 Which statement about PPPoA configuration is correct?()A、The dsl operating-mode auto command is required if the default mode has been changedB、The ip mtu 1496 command must be applied on the dialer interfaceC、The encapsulation ppp command is requiredD、The ip mtu 1492 command must be applied on the dialer interface

考题 IPS与IDS的职责都是保证网络安全,IPS注重接入控制,而IDS则进行网络监测。

考题 Which statement is correct about a Routing Policy term?()A、A term must contain a "from" statement.B、A term acts like "if" and "then" statements.C、The most specific term has precedence.D、Terms can be written in any order to achieve the same behavior.

考题 单选题Which statement about the Flinders bar of the magnetic compass is CORRECT().A It compensates for the error caused by the vertical component of the Earth's magnetic fieldB It compensates for error caused by the heeling of a vesselC It compensates for quadrantal deviationD It is only needed in equatorial waters

考题 单选题Which statement about IDS/IPS design is correct?()A An IPS should be deployed if the security policy does not support the denial of traffic.B An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

考题 单选题Which statement about an IPS is true?()A The IPS is in the traffic path.B Only one active interface is required.C Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D When malicious traffic is detected,the IPS will only send an alert to a management station.

考题 单选题Which statement about the Navigation Rules is TRUE?().A The rules require vessels to comply with Traffic Separation Scheme regulationsB The rules use the term safe speedC The Rules permit a stand-on vessel to take action prior to being in extremisD All of the above are correct

考题 单选题In a base e-Commerce module design, which routing statement is correct?()A  Routing is mostly static.B  Hardcoded IP addresses are used to support failover.C  Inbound servers use the CSM or ACE as the default gateway.D  VLANs between the access layer switches are used for FHRP protocols.

考题 单选题Which statement about data center access layer design modes is correct?()A  The access layer is the first oversubscription point in a data center design.B  When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C  When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D  When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.E  The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.

考题 单选题Which statement is correct about a Routing Policy term?()A A term must contain a from statement.B A term acts like if and then statements.C The most specific term has precedence.D Terms can be written in any order to achieve the same behavior.

考题 单选题Which statement is correct about the use of the virtual interface on a WLC ?()A  Used to relay DHCP messagesB  Used to communicate with LAPsC  Used to bring up LWAPP tunnelsD  Used to extend into the wireless client VLAN