A. applications security
B. virtual firewall protection
C. security events correlation for proactive response
D. malware, virus, and worm mitigation
您可能感興趣的試卷
你可能感興趣的試題
A. Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
B. Business strategy should directly relate to the security policy and budget.
C. The designated security expert should report to the IT department, since that is where thesolution will be implemented.
D. Security should be a continuous process.
E. Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.
A. provides advanced security such as hardware encryption acceleration
B. provides investment protection through increased modularity
C. comes equipped with at least one 1000-based TX interlace
D. contains integrated wireless access using the 802.11 g/b standard
E. contains integrated web-based management tools for easy configuration and maintenance
A. Preparation
B. Planning
C. Design
D. Implementation
E. Operation
F. Optimization
A. BGP
B. IGRP
C. ISIS
D. OSPF
E. EIGRP
A. Cisco Aironet 1000 Series
B. Cisco Aironet 1100 Series
C. Cisco Aironet 1200 Series
D. Cisco Aironet 1300 Series
E. Cisco Aironet 1400 Series
A. Cisco SDM Security Audit
B. Cisco Security MARS
C. Cisco Security Agent MC
D. Cisco Security IntelliShield
E. CAN
A. WebVPN for SSL
B. IPSec
C. AIM
D. Stateful packet inspection
A. available only in autonomous APs
B. available in autonomous and lightweight APs
C. a feature of WDS in autonomous APs
D. a feature of WDS in lightweight APs
E. requires at least one AP and one Wireless LAN Services Module
A. It provides configuration, monitoring, and troubleshooting capabilities across a wide range of security products.
B. It integrates security device management products and collects events on an "as needed" basis to reduce management overhead.
C. It integrates security management capabilities into the router or switch.
D. It provides a single point of contact for all security configuration tasks thereby enhancing the return on investment.
E. It leverages existing network management systems such as HP OpenView to lower the cost of implementation.
A. BPII
B. SPII-Plus
C. FPII
D. EPII-Plus
E. HPII
F. HPII-PIus
最新試題
Cisco ASDM provides 16 different graphs the help identify security risks by displaying data aboutpotentially malicious activity. What is one kind of data these graphs show? ()
Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()
The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()
Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
A Cisco Catalyst switch can belong to how many VTP domains? ()
A customer has deployed a wireless core feature set using autonomous access points and now wants to include a satellite building 4500 feet away from the main campus. The customer also wants to provide wireless access to a courtyard for wireless clients in close proximity to the antenna mounting position. Which Cisco Aironet product is the most applicable solution?()
Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()
At which stage of the Cisco Lifecycle Services approach would you recommend supporting and troubleshooting the system? ()
A customer needs approximately 15 to 20 wireless APs for RF coverage. Given that the customer is going to use the 1010 light weight AP with the advanced feature set, what other product is required to complete this operational functionality? ()
Which of these is a benefit of an integrated security management system? ()