A. Spanning tree protect B. Root Guard and BPDU Guard C. Unicast Reverse Path Forwarding D. MAC spoof guard E. Port Security
单项选择题WhichofthefollowingisanexampleofasecuritytechnologythatcouldbeenabledbyNetflow?()
A. Anomaly Detection B. SYN Cookies C. Application Inspection D. Content filtering E. Anti-X Protection F. Anti Virus
单项选择题WhatCiscoSwitchfeaturebestprotectsagainstCAMtableoverflowattacks?()
A. Storm Control B. Port security C. CAM table size definition D. IP spoof prevention E. Network Based Application Recognition
多项选择题WhichaccessmethodscanCS-MARSusetogetconfigurationinformationfromanAdaptiveSecurityAppliance(ASA)?()
A. SDEE B. Telnet C. Console D. FTP E. HTTPS F. SSH
单项选择题ASDMontheASAplatformisexecutedas:()
A. An active-x applicationor a java script application B. A java script application and a PHP application. C. A fully compiled .NET framework application D. A fully operational Visual Basic application E. A java applet running in the context of your browser or a stand alone application using the java run-timeenvironment
单项选择题WhatistrueaboutSYNcookies?()
A. All TCPoptions are supported, such as largewindows. B. The server can have more than8 unique MSS values. C. SYN cookies are not implemented as a method of defending against SYN floods. D. SYN cookies are implemented as a method of defending against SYN floods.