the attacker?
You work as a network operator for an IT company. You have just detected a distributed DoS
attack which appears to have sources from many hosts in network X/24. You must take preventive
action to block all offending traffic, so you announce a BGP route, with the next-hop attribute of
172.31.1.1, for the X/24 network of the attacker. Which two methods will be adopted by the routers
at the regional office, branch office, and telecommuter location to prevent traffic going to and from
the attacker? (Choose two.)
Which two technologies can prevent the Slammer worm from compromising a host?
Which two technologies can prevent the Slammer worm from compromising a host? (Choose two.)
used to protect the multi-tiered web application?
Which statement is true about the Cisco Security MARS Global Controller?
Which statement is true about the Cisco Security MARS Global Controller?
Winsock2, TCP-based application and a private site without requiring administrative privileges?
Which method can be used by Cisco SSL VPN solution to provide connections between a
Winsock2, TCP-based application and a private site without requiring administrative privileges?
Which two technologies mitigate the threat of a SYN flood attack?
Which two technologies mitigate the threat of a SYN flood attack? (Choose two.)
Which three functions can be provided by the Cisco ACE 4710 Appliance in the enterprise data center?
Which three functions can be provided by the Cisco ACE 4710 Appliance in the enterprise data center? (Choose three.)
Which two features work together to provide anti-X defense?
Which two features work together to provide anti-X defense? (Choose two.)
IOS resilient configuration?
The Cisco IOS Resilient Configuration feature enables a router to secure and maintain a working
copy of the running image and configuration so that those files can withstand malicious attempts to
erase the contents of persistent storage (NVRAM and Flash). What is the objective of the Cisco
IOS resilient configuration?
Which Cisco security product is used to perform a Security Posture Assessment of client workstations?
Which Cisco security product is used to perform a Security Posture Assessment of client workstations?