Information Technology Reference
In-Depth Information
9. Which Cisco security solution can prevent noncompliant devices from accessing the
network until they are compliant?
a.
CS-MARS
b.
IDS module
c.
AC S
d.
NAC
10. Which of the following service modules do Cisco Catalyst 6500 switches support?
(Select all that apply.)
a.
FWSM
b.
IDSM2
c.
IPsec VPN Shared Port Adapter (SPA)
d.
ASA
11. What provides attack responses by blocking malicious traffic with Gbps line rates?
a.
Network Analysis Module
b.
Anomaly Guard Module
c.
Content Switch Module
d.
Traffic A nomaly Detec tor Module
12. Which of the following are identity and access control protocols and mechanisms?
(Select all that apply.)
a.
802.1X
b.
ACLs
c.
NAC
d.
NetFlow
13. Which two of the following are Cisco security management tools?
a.
CS-MARS
b.
IDS module
c.
AC S
d.
NAC
14. Tr ue or fals e: NetFlow is u s ed for threat detec t ion and mit ig at ion.
15. Tr ue or fals e: Cis co ASAs, PIX s ec ur it y appliance s, FWSM, and IOS firewall are par t
of infection containment.
Search WWH ::




Custom Search