ATM
IDS
IOS
IOX
IPS
SDM
What are two components of the Junos software architecture? ()(Choose two.)A. Linux kernelB. routing protocol daemonC. session-based forwarding moduleD. separate routing and security planes
点击查看答案
Which statement describes a security zone?()A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management
What are two security appliances that can be installed in a network?()A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM
What are two security appliances that can be installed in a network (Choose two.)()。A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM
Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances
What are two security appliances that can be installed in a network? ()A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM