which three actions can be applied to a traffic class?
When Cisco IOS zone-based policy firewall is configured, which three actions can be applied
to a traffic class? (Choose three.)
Which label is given to a person who uses existing comp…
Which label is given to a person who uses existing computer scripts to hack into computers
lacking the expertise to write their own?
You need to place these 7 options into HIPS and NIPS
Which two characteristics of an application layer firew…
Which two characteristics of an application layer firewall are true? (Choose two)
Nat (inside,outside) dynamic interface
Nat (inside,outside) dynamic interface
All host connects to switch.
Regarding PVLAN diagram question:
Switch was in VLAN 300
Isolated Host 1 on VLAN 301
Host 2 and Host 4 on VLAN 303 or something (Community PVLAN)
Server is connected to Switch.
All host connects to switch.
What you called a person who hacks the system with scri…
What you called a person who hacks the system with script but instead of writing own script,
the person uses existing script?
What two actions would the zone base firewall when look…
What two actions would the zone base firewall when looking at the traffic?
What is the actual IOS privilege level of User Exec mode?
What is the actual IOS privilege level of User Exec mode?
Which product can be used to provide application layer …
Which product can be used to provide application layer protection for TCP port 25 traffic?