Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


what are two security appliances that can be installed a
network

Answers were Sorted based on User's Feedback



what are two security appliances that can be installed a network..

Answer / prasad yalamanchi

I think correct answer is IDS/IPS

Is This Answer Correct ?    24 Yes 1 No

what are two security appliances that can be installed a network..

Answer / laxman

Symantec antivirus and firewall

Is This Answer Correct ?    5 Yes 4 No

what are two security appliances that can be installed a network..

Answer / anurag

firewall ,ssh

Is This Answer Correct ?    8 Yes 8 No

what are two security appliances that can be installed a network..

Answer / arya

NOW A DAYS COMPANIES HAVE STARTED USING MORE SECURE
EQUIPMENTS. DAYS ARE GONE FOR IDS.
NOW FOLLOWING EQUIPMENTS CAN BE USED ON THE PRIORITY BASES.

SSL VPN BOX
IPS
FIREWALL

Is This Answer Correct ?    2 Yes 2 No

what are two security appliances that can be installed a network..

Answer / s.m.feroz ahmed

Hi,

The 2 security devices that can be installed are :

Router and FireWall.

Is This Answer Correct ?    1 Yes 1 No

what are two security appliances that can be installed a network..

Answer / sumesh t

I would opt for Cisco ASA and CISCO PIX. These are the major
security appliance from CISCO.
Opting only for this, as the Question comes under CCNA
section!!! If not, we could consider the security appliance
like netscreen etc...

Is This Answer Correct ?    1 Yes 3 No

what are two security appliances that can be installed a network..

Answer / rohit dodia

Access list and Firewall

Is This Answer Correct ?    0 Yes 4 No

what are two security appliances that can be installed a network..

Answer / prasad

One can use either Cisco PIX firewall appliance or IPS.
Both can provide deep packet inspection with statefull
inspection method and provide effective filtering against
unauthorised manipulations that try to intrude our network.

Is This Answer Correct ?    0 Yes 5 No

what are two security appliances that can be installed a network..

Answer / rohit dodia

Access list and Firewall

Is This Answer Correct ?    0 Yes 5 No

Post New Answer

More CCNA Interview Questions

What is difference between fast ethernet and ethernet port?

13 Answers   Bank of Baroda, Bank Of India,


How is rip different from igrp?

0 Answers  


friends i have 3ree prob which is asked in ibm india in technical round 1 what is ftp(this was easy i had answered) 2 why we use ftp(i think it is a tough one) 3 how can we enable ftp in the widows xp. friend i need these question answer as soon as possible if it is possible to reply within the eveing then i always obeyliged to you i am espacily looking towards the jitendera sinha who make most of the valuable answer loking toward you nidhi mall

3 Answers   IBM,


What are the advantages of using switches?

0 Answers  


Describe ICMP messages

4 Answers   HCL,


Given the following output, how can we close Telnet session 2? (Choose two) CCNA2620#show sessions Conn Host Address Idle Conn Name 1 131.108.100.152 131.108.100.152 0 131.108.100.152 *2 126.102.57.63 126.102.57.63 0 126.102.57.63 &#10061; A. Press the Enter key and enter exit. &#10061; B. Enter disconnect 2. &#10061; C. Press the Enter key and enter disconnect 2. &#10061; D. Enter close 2.

1 Answers  


Why we used Virtual MAC in GLBP

0 Answers   Infosys,


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


what is vlan

5 Answers  


Can you explain the difference between trusted and untrusted networks?

2 Answers   CCIE, Wipro,


what does PPTP use for encryption and authentication?

0 Answers   CCIE,


What are the advantages of lan switching?

0 Answers  


Categories