A.Host-based IPS can work in promiscuous mode or inline mode.
B.Network-based IPS can provide protection to desktops and servers without the need of installing specialized software on the end hosts and servers.
C.Network-based IPS is better suited for inspection of SSL and TLS encrypted data flows.
D.Host-based IPS deployment requires less planning than network-based IPS.
您可能感興趣的試卷
你可能感興趣的試題
A.HMAC
B.RSA
C.MD5
D.SHA-1
A.MD65
B.SHA-135
C.XR12
D.MD5
A.Ciphertext
B.Salt
C.Cryptotext
D.Rainbow table
A.Stack vulnerabilities
B.Heap overflows
C.Software overflows
D.Buffer overflows
A.Influencing users to forward a call to a toll number (for example, a long distance or international number)
B.Influencing users to provide personal information over a web page
C.Using an inside facilitator to intentionally forward a call to a toll number (for example, a long distance orinternational number)
D.Influencing users to provide personal information over the phone
最新試題
Please choose the correct description about Cisco Self-Defending Network characteristics.()
What is the objective of Diffie-Hellman?()
Regarding constructing a good encryption algorithm, what does creating an avalanche effect indicate?()
When configuring SSH, which is the Cisco minimum recommended modulus value?()
Which VoIP components can permit or deny a call attempt on the basis of a network’s available bandwidth?()
Refer to the exhibit. Based on the VPN connection shown, which statement is true?()
Which method is of gaining access to a system that bypasses normal security measures?()
During role-based CLI configuration, what must be enabled before any user views can be created?()
For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()
Which information is stored in the stateful session flow table while using a stateful firewall?()