what is true?
When a FWSM is operating in transparent mode, what is true?
How is automatic IP logging enabled on a sensor?
How is automatic IP logging enabled on a sensor?
Which two descriptions are correct about configuring passive RIP on the security appliance based on the follow
Which encryption protocol is suitable for an enterprise with standard security requirements?
Which encryption protocol is suitable for an enterprise with standard security requirements?
Which three factors can affect the risk of an IPS alert?
Which three factors can affect the risk of an IPS alert? (Choose three.)
What is an example of a trust model?
What is an example of a trust model?
Which of these identifies basic settings for the security appliance, including a list of contexts?
Which of these identifies basic settings for the security appliance, including a list of contexts?
Which three of these items are features of the Cisco Secure Access Control Server?
Which three of these items are features of the Cisco Secure Access Control Server? (Choose
three.)
How can you configure your sensor to identify and stop this activity?
You think users on your corporate network are disguising the use of file-sharing applications by
tunneling the traffic through port 80. How can you configure your sensor to identify and stop this
activity?
Which two of these characteristics apply to promiscuous IPS operation?
Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)