what are two security appliances that can be installed a
network
Answers were Sorted based on User's Feedback
Answer / arya
NOW A DAYS COMPANIES HAVE STARTED USING MORE SECURE
EQUIPMENTS. DAYS ARE GONE FOR IDS.
NOW FOLLOWING EQUIPMENTS CAN BE USED ON THE PRIORITY BASES.
SSL VPN BOX
IPS
FIREWALL
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
The 2 security devices that can be installed are :
Router and FireWall.
| Is This Answer Correct ? | 1 Yes | 1 No |
Answer / sumesh t
I would opt for Cisco ASA and CISCO PIX. These are the major
security appliance from CISCO.
Opting only for this, as the Question comes under CCNA
section!!! If not, we could consider the security appliance
like netscreen etc...
| Is This Answer Correct ? | 1 Yes | 3 No |
Answer / prasad
One can use either Cisco PIX firewall appliance or IPS.
Both can provide deep packet inspection with statefull
inspection method and provide effective filtering against
unauthorised manipulations that try to intrude our network.
| Is This Answer Correct ? | 0 Yes | 5 No |
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
What does the 'S' mean when looking at the routing table? A.) Statically connected B.) Directly connected C.) Dynamically attached D.) Shutdown route
Can you explain tunneling?
Which of the following is an example of the Network Layer? A.) Token Ring B.) RARP C.) LLC D.) DDP E.) TCP
Identify 3 LAN technologies? A.) FDDI B.) HDLC C.) HSSI D.) X.25 E.) 802.3 F.) 802.5
Identify the purpose of ARP? A.) Avoiding routing loops B.) Determining a workstation's IP address C.) Sending a directed broadcast D.) Determining a workstation's MAC address
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
When determining whether or not to route a LAN segment, which rule of thumb do you use? A.) 60/40 B.) 50/50 C.) 80/20 D.) 90/10 E.) 70/30
What key do you use to view the last command? A.) Left Arrow B.) Ctrl-P C.) Up Arrow D.) Right Arrow
When you issue the command show version your router returns "Configuration register is 0x0101" From where does the router boot? A. ROM B. NVRAM C. Flash D. a TFTP server
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
What is the different between console port and auxiliary port?