Which series of steps illustrates how a challenge-and-response authentication protocol functions?
What are the four most common approaches used for managing risk?
What are the four most common approaches used for managing risk? (Choose four.)
which three kinds of traffic filters can be implemented to limit routing information propagation?
On Cisco IOS routers that are running BGP, which three kinds of traffic filters can be implemented
to limit routing information propagation? (Choose three.)
Which two methods do the routers at the regional office, branch office, and telecommuter location use to preve
Refer to the exhibit. A distributed DoS attack has been detected. The attack appears to have
sources from many hosts in network X/24. An operator in the network operation center is notified
of this attack and must take preventive action. To block all offending traffic, the network operator
announces a BGP route, with the next-hop attribute of 172.31.1.1, for the X/24 network of the
attacker.
Which two methods do the routers at the regional office, branch office, and telecommuter location
use to prevent traffic going to and from the attacker? (Choose two.)
Which Cisco Security Management product supports both Cisco and third-party security products?
Which Cisco Security Management product supports both Cisco and third-party security products?
What should be configured to maintain symmetric flow of traffic when using the Gateway Load Balancing Protocol
What should be configured to maintain symmetric flow of traffic when using the Gateway Load
Balancing Protocol to enable high-availability Cisco IOS firewalls?
Which three statements regarding Virtual Tunnel Interface (VTI) are correct ?
Which three statements regarding Virtual Tunnel Interface (VTI) are correct ? (Choose three.)
What is another feature?
The Cisco IronPort S-Series is the first product that provides complete, high-performance, web
security. What is another feature?
Match the term on the left to its correct description on the right.
Which protocol is used to allow the utilization of Cisco Wide Area Application Engines or Cisco IronPort S-Ser
Which protocol is used to allow the utilization of Cisco Wide Area Application Engines or Cisco
IronPort S-Series web security appliances to localize web traffic patterns in the network and to
enable the local fulfillment of content requests?