Information Technology Reference
In-Depth Information
22. Which security solution best meets requirements for confidentiality, integrity, and
authenticity when using the public network such as the Internet?
a.
Cisco IOS firewall
b.
Intrusion prevention
c.
Secure connectivity
d.
AAA
e.
Traffic Gu ard P rotec tor
23. What uses security integrated into routers, switches, and appliances to defend against
attacks?
a.
Tr u st and ident it y management
b.
Threat defense
c.
Secure connectivity
d.
Cisco SAFE
e.
Secure firewalling
24. Encryption and authentication are used to provide secure transport across untrusted
networks by providing ________________.
a.
Tr u st and ident it y management
b.
Threat defense
c.
Secure connectivity
d.
Cisco SAFE
e.
Secure firewalling
Search WWH ::




Custom Search