which three traffic types should ACL1 permit on the firewall in front of the IPsec VPN gateway?
Refer to the exhibit. To support IPsec VPN, which three traffic types should ACL1 permit on the firewall in front of the IPsec VPN gateway? (Choose three.)
which is used to protect the multi-tiered web application?
Refer to the exhibit. Which statement correctly describes this security architecture, which is used to protect the multi-tiered web application?
Which additional security control can be used in multi-tier applications and multi-tier firewall
Which additional security control can be used in multi-tier applications and multi-tier firewall designs to force an attacker to compromise the exposed server before the attacker can attempt to penetrate the more protected domains?
What happens if a preconfigured usage threshold is exceeded
What happens if a preconfigured usage threshold is exceeded when using the Cisco IOS Network Foundation Protection (NFP) Memory Thresholding Notification and CPU Thresholding Notification features?
Which two Cisco application-layer firewall products are based on proxy technology
Which two Cisco application-layer firewall products are based on proxy technology that can analyze the SOAP protocol and its payloads (XML messages), used in web services applications? (Choose two.)
Which three Cisco IOS features can be used on the VPN gateways (Cisco IOS routers) to implement high availabil
Refer to the exhibit. Which three Cisco IOS features can be used on the VPN gateways (Cisco IOS routers) to implement high availability for remote-access IPsec VPN? (Choose three.)
Which Cisco software agent uses content scanning to identify sensitive content and controls
Which Cisco software agent uses content scanning to identify sensitive content and controls the transfer of sensitive content off the local endpoint over removable storage, locally or network- attached hardware, or network applications?
Which protocol is used to allow the utilization of Cisco Wide Area Application Engines or Cisco
Which protocol is used to allow the utilization of Cisco Wide Area Application Engines or Cisco IronPort S-Series web security appliances to localize web traffic patterns in the network and to enable the local fulfillment of content requests?
Which two methods do the routers at the regional office, branch office, and telecommuter location use to preve
Refer to the exhibit. A distributed DoS attack has been detected. The attack appears to have sources from many hosts in network X/24. An operator in the network operation center is notified of this attack and must take preventive action. To block all offending traffic, the network operator announces a BGP route, with the next-hop attribute of 172.31.1.1, for the X/24 network of the attacker.
Which two methods do the routers at the regional office, branch office, and telecommuter location use to prevent traffic going to and from the attacker? (Choose two.)
which has applications running on it that perform inadequate input data validation?
Which two Cisco products/features offer the best security controls for a web server which has applications running on it that perform inadequate input data validation? (Choose two.)