多项选择题
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
A.Pass
B.Flow
C.Allow
D.Inspect
点击查看答案
相关考题
-
单项选择题
Whichmethodisofgainingaccesstoasystemthatbypassesnormalsecuritymeasures?()
A.Starting a Smurf attack
B.Conducting social engineering
C.Creating a back door
D.Launching a DoS attack -
单项选择题
Whichoptionensuresthatdataisnotmodifiedintransit?()
A.Authorization
B.Confidentiality
C.Authentication
D.Integrity -
单项选择题
WhichtypeofintrusionpreventiontechnologywillbeprimarilyusedbytheCiscoIPSsecurityappliances?()
A.signature-based
B.profile-based
C.rule-based
D.protocol analysis-based
