|
$ f0 |* \/ L; T- a6 v; v; kWhich two new security capabilities are introduced by using a next-generation frewall at the Internet edge?(Choose two). d7 X3 @- s( t" S4 |9 V$ j
/ c/ G1 }0 U3 {! w) }7 d) [
A. integrated intrusion prevention
# @4 g+ m% y! ^* `' E: YB. NAT: M4 q8 _/ M( l; V; m- s% @$ O6 G
C. stateful packet inspection 8 s* i3 G- i; ]9 x
D.application-level inspeion # z4 N7 u0 i" W% E* x: {
E.VPN8 ?$ C: M$ R' |& Z& m2 @
. L) G% L& U! E& t: J1 y
$ I7 l' f" X4 c9 q& W& q- ZWhich component does Cisco Threat Defense use to measure bandwith,application performance,and utlization?3 K l- T) _; o8 v
7 ~' T- j9 m5 B( L6 WA. Advanced Malware Protection for Endpoints: L' H! ?7 E1 ?9 o1 {
B. NetFlow
4 B6 ~, M5 \1 O) T5 [C. Cisco Umbrella
0 [6 h+ X U# T& X/ f0 {* ~4 gD. TrustSec
' }2 Y4 R: T+ C6 q' e x. F7 \/ Z6 a/ d9 e6 X" A2 ^* W( o8 ]
6 g6 P" [( `$ B) s: S
Which architectural component enables azero-trust security model?
. r) J, @% H5 Y; h3 U6 k& |6 E- e& J! v: t' q
A. control plane
- i5 O$ ^4 a$ h* P4 L8 Y/ ~B. data plane
" B# Q, {- S' y% ]+ N( M+ RC. management plane% H5 H6 \8 \0 z) x Z
D. plug-and-play
2 S8 v( i. t+ g4 R
9 e: `+ l7 A- N+ k: ]6 @
]: g- o9 n! U4 P. M/ X" z2 ~1 a% F EWhat is the difference between the MAC address table and TCAM?
! p* ?$ n) ]( F5 V( y8 |" Z, B7 Y6 C) Y
7 w$ ?2 [$ E0 w$ ?4 T3 C% V1 A6 hA. The MAC address table supports partial matches.
) R" I$ A3 h' \% M* R! fB. TCAM requires an exact match. TCAM is used to make L2 forwarding decisions.CAM is used to build routing tables.9 I# R2 L( I; G" w& i
C. Router prefix lookups happen in TCAM MAC address table lookups happen in CAM.* Y. e5 g; E) {9 V& v) n* n
D. The MAC address table is contained in TCAM.ACL and QoS information is stored in CAM.
J4 Y5 x8 @3 Y8 f4 u$ v2 v; T9 p7 m) Q
|
|