A.Configuration interceptor B.Network interceptor C.File system interceptor D.Execution space interceptor
多项选择题WhichthreeitemsareCiscobest-practicerecommendationsforsecuringanetwork?()
A.Routinely apply patches to operating systems and applications B.Disable unneeded services and ports on hosts C.Deploy HIPS software on all end-user workstations D.Require strong passwords and enable password expiration
单项选择题Examinethefollowingitems,whichoneoffersavarietyofsecuritysolutions,includingfirewall,IPS,VPN,antispyware,antivirus,andantiphishingfeatures?()
A.Cisco IOS router B.Cisco PIX 500 series security appliance C.Cisco 4200 series IPS appliance D.Cisco ASA 5500 series security appliance
单项选择题BeforeaDiffie-Hellmanexchangemaybegin,thetwopartiesinvolvedmustagreeonwhat?()
A.Two secret keys B.Two nonsecret keys C.Two secret numbers D.Two nonsecret numbers
单项选择题Based on the username global configuration mode command displayed in the exhibit. What does the optionsecret 5 indicate about the enable secret password?()
A.It is hashed using MD5 B.It is encrypted using a proprietary Cisco encryption algorithm C.It is hashed using SHA D.It is encrypted using DH group 5
单项选择题Whichkindoftablewillbeusedbymostfirewallstodaytokeeptrackoftheconnectionsthroughthefirewall?()
A.reflexive ACL B.dynamic ACL C.queuing D.netflow E.state