多项选择题
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
单项选择题 UsersattheCharlevilleCompanybeganexperiencinghighnetworkdelayswhenInternetconnectivitywasenabledforallusers.Afterinvestigatingthetrafficflow,youdeterminethatpeer-to-peertrafficfromamusicdownloadsiteisconsumingalargeamountofbandwidth.WhichQoSmechanismcanyouimplementtoimprovethenetworkresponsetime?()
多项选择题 WhichtwoofthesekeyfieldsareusedtoidentifyaflowinatraditionalNetFlowimplementation?()
多项选择题 TheSchuylerandLivingstonIronWorkshasbeenworkingongettingitsnetworksecurityundercontrol.IthassetupVPNwithIPSeclinkstoitssuppliers.Ithasinstallednetworkvulnerabilityscannerstoproactivelyidentifyareasofweakness,anditmonitorsandrespondstosecurityeventsastheyoccur.Italsoemploysextensiveaccesscontrollists,statefulfirewall implementations,anddedicatedfirewallappliances.Thecompanyhasbeengrowingveryfastlatelyandwantstomakesureitisuptodateonsecuritymeasures.Whichtwoareasofsecuritywouldyouadvisethecompanytostrengthen?()