what are two security appliances that can be installed a
network
Answers were Sorted based on User's Feedback
Answer / arya
NOW A DAYS COMPANIES HAVE STARTED USING MORE SECURE
EQUIPMENTS. DAYS ARE GONE FOR IDS.
NOW FOLLOWING EQUIPMENTS CAN BE USED ON THE PRIORITY BASES.
SSL VPN BOX
IPS
FIREWALL
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
The 2 security devices that can be installed are :
Router and FireWall.
| Is This Answer Correct ? | 1 Yes | 1 No |
Answer / sumesh t
I would opt for Cisco ASA and CISCO PIX. These are the major
security appliance from CISCO.
Opting only for this, as the Question comes under CCNA
section!!! If not, we could consider the security appliance
like netscreen etc...
| Is This Answer Correct ? | 1 Yes | 3 No |
Answer / prasad
One can use either Cisco PIX firewall appliance or IPS.
Both can provide deep packet inspection with statefull
inspection method and provide effective filtering against
unauthorised manipulations that try to intrude our network.
| Is This Answer Correct ? | 0 Yes | 5 No |
Which cable we connect in db-9?
What is the function of Layer 2 Device?
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
Which dynamic type draw back is, if single link down, it removes its routing table?
raid can be used in? 1 NT 2 Netware 3 all of above mine answer -NT
When editing a line in the CLI mode, what does 'CTRL-A' do? A.) Moves you to the previous command. B.) Moves you to the next word. C.) Moves you to the end of the line. D.) Moves you to the next command. E.) Moves you to the beginning of the line.
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free
What is BGP attribute & How many types of attributes are used by BGP???
5 Answers Hathway, HCL, Infinite Computer Solutions,
What is the default routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) Bandwidth and delay D.) Hop count
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP