It can be configured to block Java traffic.
It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
It can only examine network layer and transport layer information.
It can only examine transport layer and application layer information.
The inspection rules can be used to set timeout values for specified protocols.
The ip inspect cbac-name command must be configured in global configuration mode.
第1题:
Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()
第2题:
Which three statements about Syslog utilization are true?()
第3题:
A.Utilizing Syslog improves network performance.
B.The Syslog server automatically notifies the network administrator of network problems.
C.A Syslog server provides the storage space necessary to store log files without using router disk space.
D.There are more Syslog messages available within Cisco IOS than there are comparable SNMP trap messages.
E.Enabling Syslog on a router automatically enables NTP for accurate time stamping。
F.A Syslog server helps in aggregation of logs and alerts.
第4题:
Which three statements about IOS Firewall configurations are true?()
第5题:
Which of these statements is true about ssids configured in cisco adu?()
第6题:
Which three products reside on the UC500 platform?()
第7题:
Which three statements about firewall modes are correct? ()
第8题:
Which of the following is true about the Cisco IOS-IPS functionality? ()
第9题:
Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
第10题:
Which two statements about the Cisco Nexus 1000V VSM are true?()