what are two security appliances that can be installed a
network
Answers were Sorted based on User's Feedback
Answer / arya
NOW A DAYS COMPANIES HAVE STARTED USING MORE SECURE
EQUIPMENTS. DAYS ARE GONE FOR IDS.
NOW FOLLOWING EQUIPMENTS CAN BE USED ON THE PRIORITY BASES.
SSL VPN BOX
IPS
FIREWALL
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
The 2 security devices that can be installed are :
Router and FireWall.
| Is This Answer Correct ? | 1 Yes | 1 No |
Answer / sumesh t
I would opt for Cisco ASA and CISCO PIX. These are the major
security appliance from CISCO.
Opting only for this, as the Question comes under CCNA
section!!! If not, we could consider the security appliance
like netscreen etc...
| Is This Answer Correct ? | 1 Yes | 3 No |
Answer / prasad
One can use either Cisco PIX firewall appliance or IPS.
Both can provide deep packet inspection with statefull
inspection method and provide effective filtering against
unauthorised manipulations that try to intrude our network.
| Is This Answer Correct ? | 0 Yes | 5 No |
What is difference between fast ethernet and ethernet port?
13 Answers Bank of Baroda, Bank Of India,
How is rip different from igrp?
friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall
What are the advantages of using switches?
Describe ICMP messages
Given the following output, how can we close Telnet session 2? (Choose two) CCNA2620#show sessions Conn Host Address Idle Conn Name 1 131.108.100.152 131.108.100.152 0 131.108.100.152 *2 126.102.57.63 126.102.57.63 0 126.102.57.63 ❍ A. Press the Enter key and enter exit. ❍ B. Enter disconnect 2. ❍ C. Press the Enter key and enter disconnect 2. ❍ D. Enter close 2.
Why we used Virtual MAC in GLBP
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
what is vlan
Can you explain the difference between trusted and untrusted networks?
what does PPTP use for encryption and authentication?
What are the advantages of lan switching?