Which statement about IDS/IPS design is correct?()

题目
单选题
Which statement about IDS/IPS design is correct?()
A

 An IPS should be deployed if the security policy does not support the denial of traffic.

B

 An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.

C

 An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.

D

 Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which statement is correct about the forwarding table?()

A. The forwarding table is stored only on the PFE

B. The forwarding table contains all known routes

C. The forwarding table is stored on both the RE and PFE

D. The forwarding table is stored only on the RE


参考答案:C

第2题:

Refer to the exhibit. Which two statements about the topologies shown are correct?()

A. Design 1 is a looped triangle design.

B. Design 2 is a looped triangle design.

C. Design 2 achieves quick convergence using RSTP.

D. Both designs supportstateful services at the aggregation layer.

E. Design 2 is the most widely deployed in enterprise data centers.


参考答案:A, D

第3题:

● Which statement about the preliminary design stage of a software development project is true? (75) .

(75)

A.The preliminary design is an internal document used only by programmers

B.The preliminary design is the result of mapping product requirements info software and hardware functions

C.The preliminary design of the product comes from the requirement specification

D.The developers produce the preliminary design by defining the software structure in enough detail to permit coding


正确答案:C

第4题:

Which statement about IDS/IPS design is correct?()

  • A、An IPS should be deployed if the security policy does not support the denial of traffic.
  • B、An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
  • C、An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
  • D、Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

正确答案:C

第5题:

IPS与IDS的区别是()

  • A、IDS是1种检测技术,IPS是一种阻断技术
  • B、IDS并联在网络上的设备,IPS是串接在网络上的设备
  • C、IPS属于审计类产品;IDS属于访问控制类产品
  • D、IPS会检测并主动防御。而IDS却只会检测然后交由防火墙处理

正确答案:A,B,D

第6题:

Which statement is correct about a Routing Policy term?()

A.A term must contain a "from" statement.

B.A term acts like "if" and "then" statements.

C.The most specific term has precedence.

D.Terms can be written in any order to achieve the same behavior.


参考答案:B

第7题:

In a base e-Commerce module design, which routing statement is correct?()

A. Routing is mostly static.

B. Hardcoded IP addresses are used to support failover.

C. Inbound servers use the CSM or ACE as the default gateway.

D. VLANs between the access layer switches are used for FHRP protocols.


参考答案:A

第8题:

Which statement is correct about the policy shown in the exhibit?()

A. All routes are accepted.

B. All routes are rejected.

C. A 172.27.0.0/24 route will be accepted.

D. A 172.27.0.0/16 route will be accepted.


参考答案:B

第9题:

As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()

  • A、 IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
  • B、 IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
  • C、 IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
  • D、 IPS inspects traffic statefully and needs to see both sides of the connection to function properly
  • E、 IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information

正确答案:C,E

第10题:

Which two statements about an IDS are true?()

  • A、The IDS is in the traffic path.
  • B、The IDS can send TCP resets to the source device.
  • C、The IDS can send TCP resets to the destination device.
  • D、The IDS listens promiscuously to all traffic on the network.
  • E、Default operation is for the IDS to discard malicious traffic.

正确答案:B,D

更多相关问题