Which two technologies address ISO 17799 requirements in detecting, preventing and responding to attacks and i
Which two technologies address ISO 17799 requirements in detecting, preventing and responding
to attacks and intrusion? (Choose two.)
what is true?
When a FWSM is operating in transparent mode, what is true?
Which encryption protocol is suitable for an enterprise with standard security requirements?
Which encryption protocol is suitable for an enterprise with standard security requirements?
Which three factors can affect the risk of an IPS alert?
Which three factors can affect the risk of an IPS alert? (Choose three.)
Which three of these items are features of the Cisco Secure Access Control Server?
Which three of these items are features of the Cisco Secure Access Control Server? (Choose
three.)
Which two of these characteristics apply to promiscuous IPS operation?
Which two of these characteristics apply to promiscuous IPS operation? (Choose two.)
(Choose three.)
Your company whishes to adopt the Adaptive Threat Defense Architecture in their security policy.
Identify three components of the anti-X defense paillar. (Choose three.)
Which three security controls can be provided by digital signatures?
Which three security controls can be provided by digital signatures? (Choose three.)
What are three advantages of Cisco Security MARS?
What are three advantages of Cisco Security MARS? (Choose three.)
Which two of these statements describe feature of the NAC Appliance Architecture?
Which two of these statements describe feature of the NAC Appliance Architecture? (Choose two.)