A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
您可能感興趣的試卷
你可能感興趣的試題
A. client antivirus software state
B. personal firewall settings
C. wireless cell bandwidth availability
D. IOS versions for routers and switches
E. appropriate client patch management level
F. appropriate QoS settings for client application
A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
A. 50
B. 100
C. 150
D. 200
E. 250
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. The iSCSI stack supports block-level storage for remote devices.
E. The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.
A. edge
B. central
C. Layer 2
D. Layer 3
A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
A. IVR
B. VoQ
C. FSPF
D. VSANs
E. SANTap
A. Layer 2 mode
B. Layer 3 Edge mode
C. Layer 3 Central mode
D. Layer 3 In-Band mode
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
最新試題
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
What is the recommended radius of a cell for a voice-ready wireless network?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
What is the traditional mode for a firewall?()
Which two of these correctly describe Fibre Channel?()
Which two of these correctly describe asymmetric routing and firewalls? ()
Which statement correctly describes a situation in which VRFs are used in the data center?()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
Which two statements about an interface configured with the asr-group command are correct? ()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()