欢迎来到计算机考试题库网 计算机题库官网
logo
全部科目 > 软件认证工程师考试 > 思科认证考试 > CCNP系列认证 > CCNP(642-825)

多项选择题

Which two statements describe the functions and operations of IDS and IPS systems?()

    A.A network administrator entering a wrong password would generate a true-negative alarm.
    B.A false positive alarm is generated when an IDS/IPS signature is correctly identified.
    C.An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.
    D.Cisco IDS works inline and stops attacks before they enter the network.
    E.Cisco IPS taps the network traffic and responds after an attack.
    F.Profile-based intrusion detection is also known as "anomaly detection".

点击查看答案

相关考题

  • 多项选择题
    Whichtwostatementsaboutcommonnetworkattacksaretrue?()

    A.Access attacks can consist of password attacks,trust exploitation,port redirection,and man-in-the-middle attacks.
    B.Access attacks can consist of password attacks,ping sweeps,port scans,and man-in-the-middle attacks.
    C.Access attacks can consist of packet sniffers,ping sweeps,port scans,and man-in-the-middle attacks.
    D.Reconnaissance attacks can consist of password attacks,trust exploitation,port redirection and Internet information queries.
    E.Reconnaissance attacks can consist of packet sniffers,port scans,ping sweeps,and Internet information queries.
    F.Reconnaissance attacks can consist of ping sweeps,port scans,man-in-middle attacks and Internet information queries.

  • 多项选择题
    WhichthreestatementsaretrueaboutCiscoIOSFirewall?()

    A.It can be configured to block Java traffic.
    B.It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
    C.It can only examine network layer and transport layer information.
    D.It can only examine transport layer and application layer information.
    E.The inspection rules can be used to set timeout values for specified protocols.
    F.The ip inspect cbac-name command must be configured in global configuration mode.

  • 多项选择题
    WhichthreefeaturesarebenefitsofusingGREtunnelsinconjunctionwithIPsecforbuildingsite-to-siteVPNs?()

    A.allows dynamic routing over the tunnel
    B.supports multi-protocol (non-IP) traffic over the tunnel
    C.reduces IPsec headers overhead since tunnel mode is used
    D.simplifies the ACL used in the crypto map
    E.uses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

微信小程序免费搜题
微信扫一扫,加关注免费搜题

微信扫一扫,加关注免费搜题