單項選擇題Which of the following is true about Outbound Malware Scanning?() 

A. It has its own policy table.
B. It is configured as part of Access Policies.
C. It is configured as part ofIronPort data Security.
D. It only has global configuration.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of these is not part of the pre_ installation worksheet?()

A. deployment option
B. acceptable use policies
C. S-Series interface settings
D. authentication infrastructure

2.單項選擇題Which statement is true?() 

A. the L4TM allow list overrides the block list
B. the overlap of the L4TM allow list and block list is the L4TM grey list
C. the L4TM block lists override the allow lists
D. L4TM allow list and block list overlaps are not permitted

3.單項選擇題Which of these is a suspect user agent?()

A. <>(the null string)
B. Wget/1.8.1
C. Mozilla/5.0
D. Opera/9.0

4.單項選擇題Which credentials must be entered into the S-Series GUI when joining the Active domain?()

A. the credentials of a privileged account on the Active directory server
B. the credentials of any account on the Active directory server
C. the credentials of the account (created by the S-Series) on the Active directory server when the domain is joined
D. the S-Series administrative account

5.單項選擇題Which of these is an optional feature,requiring the purchase of a separate license after 30 days?()

A. HTTPS Proxy
B. Data Security
C. L4TM
D. Web Reputation filtering

6.單項選擇題Which of these is a drawback in using McAfee heuristic scanning?() 

A. heuristic scanning cannot detect new malware with an unknown signature
B. heuristic scanning requires a separate license key
C. heuristic scanning increases the probability of false positives
D. heuristic scanning increases the probability of false negatives

7.單項選擇題When do you need to configure the P1 interface?()

A. whenever you have an upstream proxy
B. whenever you intend to deploy the L4TM in blocking mode
C. whenever you want to enable the WSA proxy
D. whenever you have a separate management VLAN orsubnetwork

8.單項選擇題Which of these user ICAP?()

A. anti-malware scanning
B. data loss prevention polices
C. decryption policies
D. CiscoIronPort Data Security policies

9.單項選擇題Which file characteristic cannot be used in the Cisco IronPort Data Security policies?() 

A. file type
B. file size
C. file age
D. file  name

10.單項選擇題Which statement is false?() 

A. custom URL categories cannot contain IP addresses
B. custom URL categories cannot override predefined URL categories
C. custom URL categories can contain domain names
D. custom URL categories can use regular expressions