Information Technology Reference
In-Depth Information
4. What is an appliance-based solution for network security administrators to monitor,
identity, isolate, and respond to security threats? (Select the best answer.)
a.
CS-MARS
b.
CSA MC
c.
ASDM
d.
IDM
5. Cisco IOS Trust and Identity has a set of services that include which of the follow-
ing? (Select all that apply.)
a.
802.1X
b.
SSL
c.
AAA
d.
ASDM
6. Cisco IOS ______________ offers data encryption at the IP packet level using a set of
standards-based protocols.
a.
IPS
b.
IPsec
c.
L2TP
d.
L2F
7.
What provides hardware VPN encryption for terminating a large number of VPN
tunnels for ISRs?
a.
FWSM
b.
IDS Network Module
c.
Network Analysis Module
d.
High-Performance AIM
8. What are two ways to enhance VPN performance on Cisco ISR G2s?
a.
SSL Network Module
b.
IDS Network Module
c.
Built-In Hardware VPN Acceleration
d.
High-Performance AIM
Search WWH ::




Custom Search