A.A router interface can belong to multiple zones.
B.Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.
C.The pass action works in only one direction
D.A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.
您可能感興趣的試卷
你可能感興趣的試題
A.Enable Signature Default
B.Enable Engine Fail Closed
C.Enable Default IOS Signature ActualTests.com
D.Enable Fail Opened
A.Set the enable secret command to privilege level 5
B.The enable secret password is hashed using MD5
C.The enable secret password is for accessing exec privilege level 5
D.The enable secret password is hashed using SHA
E.The enable secret password is encrypted using Cisco proprietary level 5 encryption
A.L2F tunnel
B.L2TP tunnel
C.GRE tunnel
D.ISAKMP tunnel
A.OTP
B.OOB
C.SAFE
D.MARS
A.They use the same key for encryption and decryption of data.
B.They use different keys for decryption but the same key for encryption of data.
C.They use different keys for encryption and decryption of data.
D.They use the same key for decryption but different keys for encryption of data.
最新試題
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
Which statement is true about a Smurf attack?()
When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()
How do you define the authentication method that will be used with AAA?()
Which type of intrusion prevention technology will be primarily used by the Cisco IPS security appliances?()
Which one of the aaa accounting commands can be used to enable logging of both the start and stoprecords for user terminal sessions on the router?()
Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()