单项选择题
Which key method is used to detect and prevent attacks by use of IDS and/or IPS technologies?()
A.Signature-based detection
B.Anomaly-based detection
C.Honey pot detection
D.Policy-based detection
相关考题
-
单项选择题
Whichoneoftheaaaaccountingcommandscanbeusedtoenableloggingofboththestartandstoprecordsforuserterminalsessionsontherouter?()
A.aaa accounting connection start-stop tacacs+
B.aaa accounting exec start-stop tacacs+
C.aaa accounting system start-stop tacacs+
D.aaa accounting network start-stop tacacs+ -
单项选择题
Which statement is correct regarding the aaa configurations based on the exhibit provided?()
A.The authentication method list used by the vty port is named test.
B.If the TACACS+ AAA server is not available, no users will be able to establish a Telnet session with the router.
C.If the TACACS+ AAA server is not available, console access to the router can be authenticated using the local database.
D.The authentication method list used by the console port is named test. -
单项选择题
Whenconfiguringrole-basedCLIonaCiscorouter,whichactionwillbetakenfirst?()
A.Create a parser view called "root view."
B.Log in to the router as the root user.
C.Enable the root view on the router.
D.Enable role-based CLI globally on the router using the privileged EXEC mode Cisco IOS command.
