A. SDEE B. Telnet C. Console D. FTP E. HTTPS F. SSH
单项选择题ASDMontheASAplatformisexecutedas:()
A. An active-x applicationor a java script application B. A java script application and a PHP application. C. A fully compiled .NET framework application D. A fully operational Visual Basic application E. A java applet running in the context of your browser or a stand alone application using the java run-timeenvironment
单项选择题WhatistrueaboutSYNcookies?()
A. All TCPoptions are supported, such as largewindows. B. The server can have more than8 unique MSS values. C. SYN cookies are not implemented as a method of defending against SYN floods. D. SYN cookies are implemented as a method of defending against SYN floods.
单项选择题Of thethreatsdiscussedbelow,whatisthemainadvantageofusingCiscoSecureDesktop whichispartoftheCisco ASA VPNsolution?()
A. Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer. B. Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages. C. Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate. D. Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.
多项选择题WhichstatementsaretrueconcerningNAT?()
A. NAT provides 1 to manyaddress mapping. B. NAT provides 1 to 1 address mapping. C. NAT is only useful forTCP/UDP and ICMP traffic. D. NAT can be used for all IP traffic.
多项选择题WhattechnologiesareincludedinAnti-X?()
A. Content and URL filtering B. Intrusion Prevention C. VPN D. Virus and Phishing protection E. Content Caching