|
B0 b3 e) e! z5 S6 s
Which two new security capabilities are introduced by using a next-generation frewall at the Internet edge?(Choose two)
6 M/ A* D) T% E8 g2 U
6 Z, R$ e6 t) }! ?2 SA. integrated intrusion prevention
4 \! v: C: a1 J# p K0 u: pB. NAT& k. {* N8 V& ?- F' p& Y. }' \
C. stateful packet inspection
& C) m1 H1 n- K; i HD.application-level inspeion ' u7 f; Q) ]3 r, K& S7 x) g; ?. X. S: ]
E.VPN
Q% u u; _; i4 [5 J, `! R; e7 D+ T$ S& e7 v }1 B
3 O* N1 c, a) A2 a F" KWhich component does Cisco Threat Defense use to measure bandwith,application performance,and utlization?
9 R! O, w/ j( q# j5 s% j# o
( U: I, o& [( S6 B5 QA. Advanced Malware Protection for Endpoints$ a1 R: `$ _! c9 z5 M: l( I& a
B. NetFlow
# T0 t9 L) d N) o2 ?3 oC. Cisco Umbrella / @! T5 F; d) D: v) y" l
D. TrustSec
# m. X* ^) a8 R+ C* X. Q' R8 F
. q( x) i; A, v! W7 j4 R
a' d1 o% N3 l) s0 |5 \* g( L [; eWhich architectural component enables azero-trust security model?
0 v" C; A+ t% e0 {7 A6 ?1 n# K6 G. u: s3 _" M
A. control plane & S6 |3 W+ j0 X/ {
B. data plane, A) K9 }$ r9 N" Z. [
C. management plane
. W7 {* Z" d" JD. plug-and-play: O; W2 Y! o, L" A5 d+ B
# Z! k) h0 F5 u* M& Z
) I5 ], m1 A- z/ g1 {& O [- E. FWhat is the difference between the MAC address table and TCAM?
% c2 q9 U" |5 Y$ H- a! t; X+ C5 K x
A. The MAC address table supports partial matches.
L+ m3 J2 p0 _: KB. TCAM requires an exact match. TCAM is used to make L2 forwarding decisions.CAM is used to build routing tables.
3 t! g. E8 K, }8 G }9 o0 PC. Router prefix lookups happen in TCAM MAC address table lookups happen in CAM.+ U2 q* c2 l8 [. N: s
D. The MAC address table is contained in TCAM.ACL and QoS information is stored in CAM.
2 B1 S, n# a! w/ |+ H8 t8 s. D. ?
1 u) n; j# h" ^4 _5 @/ T |
|