A. 50
B. 100
C. 150
D. 200
E. 250
您可能感興趣的試卷
你可能感興趣的試題
A. It should be implemented in a management VLAN.
B. Its connection to managed devices should be over a data VLAN.
C. It is made up of Cisco Security MARS and Clean Access software.
D. It should be deployed as close to the edge of the network as possible.
E. It delivers policy administration and enforcement for the Cisco Self-Defending Network.
A. secure tunnels
B. a separate management VLAN
C. secure VLANs to isolate sensors
D. an out-of-band path around the firewall
E. asymmetric traffic flows to isolate sensors
F. private VLANs to put all sensors on isolated ports
A. bridging VLANs on two switches
B. bridging two VLANs on one switch
C. between two Layer 2 devices with trunking
D. between two Layer 2 devices without trunking
E. between a Layer 2 device and a Layer 3 device with trunking
A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to thedefault gateway.
最新試題
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
In which two locations in an enterprise network can an IPS sensor be placed? ()
Which signal and noise values will result in the best phone communication with an access point?()
Which path selection protocol is used by Fibre Channel fabrics?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
What are two characteristics of the SLB One-arm mode? ()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
Which statement correctly describes a situation in which VRFs are used in the data center?()