Which platform can support the highest number of SSL sessions?
Which platform can support the highest number of SSL sessions?
Which option best describes Dynamic Content Filtering on the web security appliance?
Which option best describes Dynamic Content Filtering on the web security appliance?
Which countermeasure is best used to protect against rogue access points that are outside the enterprise physi
Which countermeasure is best used to protect against rogue access points that are outside the
enterprise physical perimeter and that attempt to attract legitimate clients?
Which two settings can the Cisco Security Agent (release 5.2 and later) monitor to control user’s wirele
Which two settings can the Cisco Security Agent (release 5.2 and later) monitor to control user’s
wireless access? (Choose two.)
Which series of steps illustrates how a challenge-and-response authentication protocol functions?
What are the four most common approaches used for managing risk?
What are the four most common approaches used for managing risk? (Choose four.)
which three kinds of traffic filters can be implemented to limit routing information propagation?
On Cisco IOS routers that are running BGP, which three kinds of traffic filters can be implemented
to limit routing information propagation? (Choose three.)
Which two methods do the routers at the regional office, branch office, and telecommuter location use to preve
Refer to the exhibit. A distributed DoS attack has been detected. The attack appears to have
sources from many hosts in network X/24. An operator in the network operation center is notified
of this attack and must take preventive action. To block all offending traffic, the network operator
announces a BGP route, with the next-hop attribute of 172.31.1.1, for the X/24 network of the
attacker.
Which two methods do the routers at the regional office, branch office, and telecommuter location
use to prevent traffic going to and from the attacker? (Choose two.)
Which Cisco Security Management product supports both Cisco and third-party security products?
Which Cisco Security Management product supports both Cisco and third-party security products?
What should be configured to maintain symmetric flow of traffic when using the Gateway Load Balancing Protocol
What should be configured to maintain symmetric flow of traffic when using the Gateway Load
Balancing Protocol to enable high-availability Cisco IOS firewalls?