You are asked to deploy user access to the Internet, and you want to determine which applications are
passing through the firewall Which feature accomplishes this Task?
A. AppQoS
B. AppFW
C. AppTfack
D. IPS
正解:C
質問 2:
Where are the security policies enforced for next-generation firewalls?
A. at the Data Link Layer
B. at the Application Layer
C. at the Session Layer
D. at the Presentation Layer
正解:B
質問 3:
You are asked to provide a design proposal for a campus network As part of the design, the customer
requires that all end user devices must be authenticated before being granted access to their Layer 2
network.
A. NAT
B. iPsec
C. 802.1X
D. ALGs
正解:C
質問 4:
What are two reasons to add Routing Engine protection? (Choose two.)
A. to conceal routes by hiding them behind Internet gateways
B. to ensure that only permitted network nodes and hosts communicate with the WAN infrastructure
C. to ensure that all routing information is encrypted
D. to protect the infrastructure from DDoS attacks
正解:B,D
質問 5:
What are the three activities in the reconnaissance phase of an attack"? (Choose three)
A. Map the network
B. Propagate the virus to servers and workstations
C. Install malware.
D. Determine the device OS
E. Scan for devices and ports to exploit
正解:A,D,E
質問 6:
What is one way to increase the security of a site-to-site IPsec VPN tunnel?
A. Change IKE Phase 1 from main mode to aggressive mode.
B. Implement traffic selectors.
C. Implement a policy-based VPN.
D. Implement a stronger Diffie-Hellman group.
正解:B