A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts
您可能感興趣的試卷
你可能感興趣的試題
A.resetconfig
B.restoreconfig
C.loadconfig
D.reload
A. drop
B. pass-through
C. decrypt
D. block
A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies
A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user
A.time of day
B.user agent
C.proxy port
D.usage quotas
最新試題
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
For WSA SaaS Access Control, the Identity Provider is:()
What does the appearance of the ACL tag BLOCK_WBRS in the access log mean?()
Which statement about HTTPS decryption on the WSA is true?()
Which of these is not an action that is associated with HTTPS decryption policies?()
Which of these is the best way to convince a prospect of the benefits of the S-Series?()
In the access log,what does an ACL tag beginning with BLOCK_ADMIN indicate?()
Which of the following is NOT provided by AVC?()
TRR and TRT are associated with Which WSA component?()
Which credentials must be entered into the S-Series GUI when joining the Active domain?()