what are two security appliances that can be installed a
network
Answers were Sorted based on User's Feedback
Answer / arya
NOW A DAYS COMPANIES HAVE STARTED USING MORE SECURE
EQUIPMENTS. DAYS ARE GONE FOR IDS.
NOW FOLLOWING EQUIPMENTS CAN BE USED ON THE PRIORITY BASES.
SSL VPN BOX
IPS
FIREWALL
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
The 2 security devices that can be installed are :
Router and FireWall.
| Is This Answer Correct ? | 1 Yes | 1 No |
Answer / sumesh t
I would opt for Cisco ASA and CISCO PIX. These are the major
security appliance from CISCO.
Opting only for this, as the Question comes under CCNA
section!!! If not, we could consider the security appliance
like netscreen etc...
| Is This Answer Correct ? | 1 Yes | 3 No |
Answer / prasad
One can use either Cisco PIX firewall appliance or IPS.
Both can provide deep packet inspection with statefull
inspection method and provide effective filtering against
unauthorised manipulations that try to intrude our network.
| Is This Answer Correct ? | 0 Yes | 5 No |
Which of the following is a characteristic of a switch, but not of a router? A.) Switches forward packets based on the IPX or IP address in the frame B.) Switches forward packets based on the IP address in the frame C.) Switches forward packets based on the MAC address in the frame D.) Switches forward packets based only on the IP address in the packet
Explain what is the default behavior of access-list?
CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office
Identify the command to copy a configuration file from a TFTP server to a routers active configuration? A.) Router# copy running-config tftp B.) Router# copy tftp running-config C.) Router# copy tftp 172.16.0.1 running-config D.) Router(config)# copy tftp running-config
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells
What is the purpose of the DLCI? A.) Identifies the remote routers B.) Contained with a 802.2 frame for routing purposes C.) Used with PPP during authentication D.) Identifies the PVC in a Frame Relay network
What is the difference between switch and hub?
In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically detect the LMI type. What is this known as? A.) Psychic B.) ESP C.) Inverse ARP D.) Hello E.) Reverse ARP F.) Autosense
what is the main features of link state routing protocols?
Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces
Which of the following are Transport layer protocols? A.) UDP B.) TCP C.) NBP D.) IP E.) SPX