Which three of these features are key elements of the Adaptive Threat Defense?
Which three of these features are key elements of the Adaptive Threat Defense? (Choose three.)
Which command captures live traffic on Fast Ethernet interface 0/1?
Which command captures live traffic on Fast Ethernet interface 0/1?
Which two technologies can prevent the Slammer worm from compromising a host?
Which two technologies can prevent the Slammer worm from compromising a host? (Choose two.)
which three tasks are mandatory?
For creating and configuring a security context, which three tasks are mandatory? (Choose three.)
Which primary security design components should be addressed while implementing secure WAN solutions?
Which primary security design components should be addressed while implementing secure
WAN solutions?(Not all design components are required.)
1. authentication and transmission protection
2. network infrastructure device hardening
3. boundary access control
4. topology
5. high availability
6. performance and scalability
7. resource separation
Which action is available only to signatures supported by the Normalizer engine
Which action is available only to signatures supported by the Normalizer engine
Which two technologies mitigate the threat of a SYN Flood attack?
Which two technologies mitigate the threat of a SYN Flood attack? (Choose two.)
Which two types of failover is this adaptive security appliance configured for?
Study the exhibit carefully. Which two types of failover is this adaptive security appliance
configured for? (Choose two.)
asa1# show failover
Failover On
Cable status: N/A-LAN-based failover enabled
Failover unit Primary
Failover LAN Interface: lanfail GigabitEthernetO/2 (up)
Unit Poll frequency 15 seconds, holdtime 45 seconds
Interface Poll frequency 15 seconds
Interface Policy 1
Monitored Interfaces 4 of 250 maximum
Group 1 last failover at: 15:54:49 UTC Sept 17 2006
Group 2 last failover at: 15:55:00 UTC Sept 17 2006
Which two of these features are the most appropriate test parameters for the acceptance test plan of a secure
Which two of these features are the most appropriate test parameters for the acceptance test plan
of a secure connectivity solution? (Choose two.)
Which two technologies address ISO 17799 requirements in detecting, preventing and responding to attacks and i
Which two technologies address ISO 17799 requirements in detecting, preventing and responding
to attacks and intrusion? (Choose two.)