




版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
CCNP/CCIESecuritySCOR思科網(wǎng)絡(luò)工程師題庫2
Ql.WhatcanbeintegratedwithCiscoThreatIntelligenceDirectortoprovideinformation
aboutsecuritythreats,whichallowstheSOCtoproactivelyautomateresponsestothose
threats?
A.CiscoUmbrella
B.ExternalThreatFeeds
C.CiscoThreatGrid
D.CiscoStealthwatch
Answer:C
Explanation:
CiscoThreatIntelligenceDirector(CTID)canbeintegratedwithexistingThreatIntelligence
Platformsdeployedbyyourorganizationtoingestthreatintelligenceautomatically.
Reference:
/developer/automate-threat-intelligence-using-cisco-threat-
intelligence-director
Q2.WhichsolutioncombinesCiscoIOSandIOSXEcomponentstoenableadministratorsto
recognizeapplications,collectandsendnetworkmetricstoCiscoPrimeandotherthird-party
managementtools,andprioritizeapplicationtraffic?
A.CiscoSecurityIntelligence
B.CiscoApplicationVisibilityandControl
C.CiscoModelDrivenTelemetry
D.CiscoDNACenter
Answer:B
Explanation:
TheCiscoApplicationVisibilityandControl(AVC)solutionleveragesmultipletechnologiesto
recognize,analyze,andcontrolover1000applications,includingvoiceandvideo,email,file
sharing,gaming,peer-to-peer(P2P),andcloud-basedapplications.AVCcombinesseveral
CiscoIOS/IOSXEcomponents,aswellascommunicatingwithexternaltools,tointegratethe
followingfunctionsintoapowerfulsolution...
Reference:
/c/en/us/td/docs/ios/solutions_docs/avc/guide/avc-user-
guide/avc_tech_overview.html
Q3.WhichtwoactivitiescanbedoneusingCiscoDNACenter?(Choosetwo)
A.DHCP
B.Design
C.Accounting
D.DNS
E.Provision
Answer:BE
Explanation:
CiscoDNACenterhasfourgeneralsectionsalignedtoITworkflows:
Design:Designyournetworkforconsistentconfigurationsbydeviceandbysite.Physical
mapsandlogicaltopologieshelpprovidequickvisualreference.Thedirectimportfeature
bringsinexistingmaps,images,andtopologiesdirectlyfromCiscoPrimeInfrastructureand
theCiscoApplicationPolicyInfrastructureControllerEnterpriseModule(APIC-EM),making
upgradeseasyandquick.Deviceconfigurationsbysitecanbeconsolidatedina"golden
image"thatcanbeusedtoautomaticallyprovisionnewnetworkdevices.Thesenewdevices
caneitherbepre-stagedbyassociatingthedevicedetailsandmappingtoasite.Ortheycan
beclaimeduponconnectionandmappedtothesite.Policy:Translatebusinessintentinto
networkpoliciesandapplythosepolicies,suchasaccesscontrol,trafficrouting,andquality
ofservice,consistentlyovertheentirewiredandwirelessinfrastructure.Policy-basedaccess
controlandnetworksegmentationisacriticalfunctionoftheCiscoSoftware-DefinedAccess
(SD-Access)solutionbuiltfromCiscoDNACenterandCiscoIdentityServicesEngine(ISE).
CiscoAlNetworkAnalyticsandCiscoGroup-BasedPolicyAnalyticsrunningintheCiscoDNA
Centeridentifyendpoints,groupsimilarendpoints,anddeterminegroupcommunication
behavior.CiscoDNACenterthenfacilitatescreatingpoliciesthatdeterminetheformof
communicationallowedbetweenandwithinmembersofeachgroup.ISEthenactivatesthe
underlyinginfrastructureandsegmentsthenetworkcreatingavirtualoverlaytofollowthese
policiesconsistently.Suchsegmentingimplementszero-trustsecurityintheworkplace,
reducesrisk,containsthreats,andhelpsverifyregulatorycompliancebygivingendpointsjust
therightlevelofaccesstheyneed.
Provision:OnceyouhavecreatedpoliciesinCiscoDNACenter,provisioningisasimple
drag-and-droptask.Theprofiles(calledscalablegrouptagsor"SGTs")intheCiscoDNA
Centerinventorylistareassignedapolicy,andthispolicywillalwaysfollowtheidentity.The
processiscompletelyautomatedandzero-touch.Newdevicesaddedtothenetworkare
assignedtoanSGTbasedonidentity--greatlyfacilitatingremoteofficesetups.
Assurance:CiscoDNAAssurance,usingAI/ML,enableseverypointonthenetworktobecome
asensor,sendingcontinuousstreamingtelemetryonapplicationperformanceanduser
connectivityinrealtime.Thecleanandsimpledashboardshowsdetailednetworkhealthand
flagsissues.Then,guidedremediationautomatesresolutiontokeepyournetworkperforming
atitsoptimalwithlessmundanetroubleshootingwork.Theoutcomeisaconsistent
experienceandproactiveoptimizationofyournetwork,withlesstimespenton
troubleshootingtasks.
Reference:
https://www.cisco.eom/c/en/us/products/collateral/cloud-systems-management/dna-
center/nb-06-dna-center-so-cte-en.html
Q4.Whatmustbeusedtosharedatabetweenmultiplesecurityproducts?
A.CiscoRapidThreatContainment
B.CiscoPlatformExchangeGrid
C.CiscoAdvancedMalwareProtection
D.CiscoStealthwatchCloud
Answer:B
Q5.WhichCiscoproductisopen,scalable,andbuiltonIETFstandardstoallowmultiple
securityproductsfromCiscoandothervendorstosharedataandinteroperatewitheach
other?
A.AdvancedMalwareProtection
B.PlatformExchangeGrid
C.MultifactorPlatformIntegration
D.FirepowerThreatDefense
Answer:B
Explanation:
WithCiscopxGrid(PlatformExchangeGrid),yourmultiplesecurityproductscannowshare
dataandworktogether.Thisopen,scalable,andIETFstandards-drivenplatformhelpsyou
automatesecuritytogetanswersandcontainthreatsfaster.
Q6.WhatisafeatureoftheopenplatformcapabilitiesofCiscoDNACenter?
A.intent-basedAPIs
B.automationadapters
C.domainintegration
D.applicationadapters
Answer:A
Q7.WhatisthefunctionoftheContextDirectoryAgent?
A.maintainsusers'groupmemberships
B.relaysuserauthenticationrequestsfromWebSecurityAppliancetoActiveDirectory
C.readstheActiveDirectorylogstomapIPaddressestousernames
D.acceptsuserauthenticationrequestsonbehalfofWebSecurityApplianceforuser
identification
Answer:C
Explanation:
CiscoContextDirectoryAgent(CDA)isamechanismthatmapsIPAddressestousernames
inordertoallowsecuritygatewaystounderstandwhichuserisusingwhichIPAddressinthe
network,sothosesecuritygatewayscannowmakedecisionsbasedonthoseusers(orthe
groupstowhichtheusersbelongto).
CDArunsonaCiscoLinuxmachine;monitorsinrealtimeacollectionofActiveDirectory
domaincontroller(DC)machinesforauthentication-relatedeventsthatgenerallyindicate
userlogins;learns,analyzes,andcachesmappingsofIPAddressesanduseridentitiesinits
database;andmakesthelatestmappingsavailabletoitsconsumerdevices.
Reference:
https://www.cisco.eom/c/en/us/td/docs/security/ibf/cda_10/lnstall_Config_guide/cdal
0/cda_oveviw.html
Q8.WhatisacharacteristicofabridgegroupinASAFirewalltransparentmode?
A.Itincludesmultipleinterfacesandaccessrulesbetweeninterfacesarecustomizable
B.ItisaLayer3segmentandincludesoneportandcustomizableaccessrules
C.ItallowsARPtrafficwithasingleaccessrule
D.IthasanIPaddressonitsBVIinterfaceandisusedformanagementtrafficAnswer:A
Explanation:
AbridgegroupisagroupofinterfacesthattheASAbridgesinsteadofroutes.Bridgegroups
areonlysupportedinTransparentFirewallMode.Likeanyotherfirewallinterfaces,access
controlbetweeninterfacesiscontrolled,andalloftheusualfirewallchecksareinplace.Each
bridgegroupincludesaBridgeVirtualInterface(BVI).TheASAusestheBVIIPaddressasthe
sourceaddressforpacketsoriginatingfromthebridgegroup.TheBVIIPaddressmustbeon
thesamesubnetasthebridgegroupmemberinterfaces.TheBVIdoesnotsupporttrafficon
secondarynetworks;onlytrafficonthesamenetworkastheBVIIPaddressissupported.You
canincludemultipleinterfacesperbridgegroup.Ifyouusemorethan2interfacesperbridge
group,youcancontrolcommunicationbetweenmultiplesegmentsonthesamenetwork,
andnotjustbetweeninsideandoutside.Forexample,ifyouhavethreeinsidesegmentsthat
youdonotwanttocommunicatewitheachother,youcanputeachsegmentonaseparate
interface,andonlyallowthemtocommunicatewiththeoutsideinterface.Oryoucan
customizetheaccessrulesbetweeninterfacestoallowonlyasmuchaccessasdesired.
Reference:
https://www.cisco.eom/c/en/us/td/docs/security/asa/asa95/configuration/general/asa
-95-general-config/intro-fw.html
Note:BVIinterfaceisnotusedformanagementpurpose.Butwecanaddaseparate
Managementslot/portinterfacethatisnotpartofanybridgegroup,andthatallowsonly
managementtraffictotheASA.
Q9.WhenCiscoandotherindustryorganizationspublishandinformusersofknownsecurity
findingsandvulnerabilities,whichnameisused?
A.CommonSecurityExploits
B.CommonVulnerabilitiesandExposures
C.CommonExploitsandVulnerabilities
D.CommonVulnerabilities,ExploitsandThreats
Answer:B
Explanation:
Vendors,securityresearchers,andvulnerabilitycoordinationcenterstypicallyassign
vulnerabilitiesanidentifierthat'sdisclosedtothepublic.Thisidentifierisknownasthe
CommonVulnerabilitiesandExposures(CVE).CVEisanindustry-widestandard.CVEis
sponsoredbyUS-CERT,theofficeofCybersecurityandCommunicationsattheU.S.
DepartmentofHomelandSecurity.ThegoalofCVEistomakeit'seasiertosharedataacross
tools,vulnerabilityrepositories,andsecurityservices.
Reference:
QlO.WhichtwofieldsaredefinedintheNetFlowflow?(Choosetwo)
A.typeofservicebyte
B.classofservicebits
C.Layer4protocoltype
D.destinationport
E.outputlogicalinterface
Answer:AD
Explanation:
CiscostandardNetFlowversion5definesaflowasaunidirectionalsequenceofpacketsthat
allsharesevenvalueswhichdefineauniquekeyfortheflow:
+Ingressinterface(SNMPiflndex)
+SourceIPaddress
+DestinationIPaddress
+IPprotocol
+SourceportforUDPorTCP,0forotherprotocols
+DestinationportforUDPorTCP,typeandcodeforICMP,or0forotherprotocols+IPType
ofService
Note:Aflowisaunidirectionalseriesofpacketsbetweenagivensourceanddestination.
Qll.Whatprovidestheabilitytoprogramandmonitornetworksfromsomewhereotherthan
theDNACGUI?
A.NetFlow
B.desktopclient
C.ASDM
D.API
Answer:D
Q12.Anorganizationhastwomachineshostingwebapplications.Machine1isvulnerableto
SQLinjectionwhilemachine2isvulnerabletobufferoverflows.
Whatactionwouldallowtheattackertogainaccesstomachine1butnotmachine2?
A.sniffingthepacketsbetweenthetwohosts
B.sendingcontinuouspings
C.overflowingthebuffer'smemory
D.insertingmaliciouscommandsintothedatabase
Answer:D
Q13AnorganizationistryingtoimprovetheirDefenseinDepthbyblockingmalicious
destinationspriortoaconnectionbeingestablished.Thesolutionmustbeabletoblock
certainapplicationsfrombeingusedwithinthenetwork.
Whichproductshouldbeusedtoaccomplishthisgoal?
A.CiscoFirepower
B.CiscoUmbrella
C.ISE
D.AMP
Answer:B
Explanation:
CiscoUmbrellaprotectsusersfromaccessingmaliciousdomainsbyproactivelyanalyzingand
blockingunsafedestinations?beforeaconnectionisevermade.Thusitcanprotectfrom
phishingattacksbyblockingsuspiciousdomainswhenusersclickonthegivenlinksthatan
attackersent.
Q14.Acompanyisexperiencingexfiltrationofcreditcardnumbersthatarenotbeingstored
on-premise.Thecompanyneedstobeabletoprotectsensitivedatathroughoutthefull
environment.
Whichtoolshouldbeusedtoaccomplishthisgoal?
A.SecurityManager
B.Cloudlock
C.WebSecurityAppliance
D.CiscoISE
Answer:B
Explanation:
CiscoCloudlockisacloud-nativecloudaccesssecuritybroker(CASB)thathelpsyoumoveto
thecloudsafely.Itprotectsyourcloudusers,data,andapps.CiscoCloudlockprovides
visibilityandcompliancechecks,protectsdataagainstmisuseandexfiltration,andprovides
threatprotectionsagainstmalwarelikeransomware.
Q15.Anengineeristryingtosecurelyconnecttoarouterandwantstopreventinsecure
algorithmsfrombeingused.However,theconnectionisfailing.
Whichactionshouldbetakentoaccomplishthisgoal?
A.Disabletelnetusingthenoiptelnetcommand.
B.EnabletheSSHserverusingtheipsshservercommand.
C.Configuretheportusingtheipsshport22command.
D.GeneratetheRSAkeyusingthecryptokeygeneratersacommand.
Answer:D
Explanation:
Inthisquestion,theengineerwastryingtosecuretheconnectionsomaybehewastryingto
allowSSHtothedevice.Butmaybesomethingwentwrongsotheconnectionwasfailing(the
connectionusedtobegood).Somaybehewasmissingthe"cryptokeygeneratersa"
command.
Q16AnetworkadministratorisusingtheCiscoESAwithAMPtouploadfilestothecloudfor
analysis.Thenetworkiscongestedandisaffectingcommunication.
HowwilltheCiscoESAhandleanyfileswhichneedanalysis?
A.AMPcalculatestheSHA-256fingerprint,cachesit,andperiodicallyattemptstheupload.
B.Thefileisqueuedforuploadwhenconnectivityisrestored.
C.Thefileuploadisabandoned.
D.TheESAimmediatelymakesanotherattempttouploadthefile.
Answer:C
Explanation:
Theappliancew川tryoncetouploadthefile;ifuploadisnotsuccessful,forexamplebecause
ofconnectivityproblems,thefilemaynotbeuploaded.Ifthefailurewasbecausethefile
analysisserverwasoverloaded,theuploadwillbeattemptedoncemore.
Reference:
/c/en/us/support/docs/security/email-security-
appliance/118796-technote-esa-OO.html
Inthisquestion,itstated"thenetworkiscongested"(notthefileanalysisserverwas
overloaded)sotheappliancewillnottrytouploadthefileagain.
Q17.Whichtypeofalgorithmprovidesthehighestlevelofprotectionagainstbrute-force
attacks?
A.PFS
B.HMAC
C.MD5
D.SHA
Answer:D
Q18.WhatmustbeconfiguredinCiscoISEtoenforcereauthenticationofanendpointsession
whenanendpointisdeletedfromanidentitygroup?
A.postureassessment
B.CoA
C.externalidentitysource
D.SNMPprobe
Answer:B
Explanation:
CiscoISEallowsaglobalconfigurationtoissueaChangeofAuthorization(CoA)intheProfiler
Configurationpagethatenablestheprofilingservicewithmorecontroloverendpointsthat
arealreadyauthenticated.
OneofthesettingstoconfiguretheCoAtypeis"Reauth".Thisoptionisusedtoenforce
reauthenticationofanalreadyauthenticatedendpointwhenitisprofiled.
Reference:
https://www.cisco.eom/c/en/us/td/docs/security/ise/1-
3/admin_guide/b_ise_admin_guide_13/bJse_admin_guide_sample_chapter_010101.htm
Q19.Anetworkadministratorisconfiguringaruleinanaccesscontrolpolicytoblockcertain
URLsandselectsthe"ChatandInstantMessaging"category.
Whichreputationscoreshouldbeselectedtoaccomplishthisgoal?
A.1
B.3
C.5
D.10
Answer:D
Explanation:
Wechoose"ChatandInstantMessaging"categoryin"URLCategory":
EditAction
Quarantine
EncryptonDeliveryURLCategory
StripAttachmentbyContentDoesanyURLinthemessagebody
theselecte<3categories?
StripAttachmentbyHieInfo
|URLCategory
AvailableCategories:
URLReputation
/U)verttsements.ya]
AddDisdeinnerTextAlcohol
BypassOutbreakFitterScanning
BypassDK1MSigningAuctions
Buslne&sandIndustry
SendCopy(Bcc:)CHatandInstantMessagir
NotifyandP1?9?ertbm
ComputerSecunty
ChangeRecipienttoComputersandIr?ternet
SendtoAlternateDestinationHost
DeliverfromIPInterfaceOseaURLwliiteiist:MQWB
StripHeader
Add/EditHeaderActiononUR1_:
AddMessageTag?,DefangURL'
AddLO4EntryRedirecttoCiscoSecurityProxy
S/MIMESign/EncryptonDelivery
ReplaceURLwithtextmessage
EncryptarkdDeliverNow(Final
Action)
S/MIMESign/EncrypC(FinalAcxion)
Bounce(FinalAction)PerformActionfor:
SkipRemainingContentFitters?Allmessages
(FinalAction)
Unsignedmessages
Drop(FinalAction)
ToblockcertainURLsweneedtochooseURLReputationfrom6to10.
EditCondition
MessageBodyorAttachment
MessageBodyURLReputation
URLCategoryWhatisthereputationofURL'sintt
evaluatesURL'susingtheirWebBai
URLReputation
MessageSize
AttachmentContentURLReputationis:
AttachmentFileInfo0Malicious(-10.0to-6.0)
AttachmentProtectionSuspect(-5.9toS.9)
SubjectHeader
Clean(6.0to10.0)
OtherHeader
EnvelopeSenderCustomRange(mintomax)
EnvelopeRecipientI-1-
ReceivingListenerNoScore
RemoteIP/Hostname
ReputationScoreuseaURLwhitelist:None:
Q20.WhichgroupwithinCiscowritesandpublishesaweeklynewslettertohelpcybersecurity
professionalsremainawareoftheongoingandmostprevalentthreats?
A.PSIRT
B.Talos
C.CSIRT
D.DEVNET
Answer:B
Explanation:
TalosThreatSourceisaregularintelligenceupdatefromCiscoTalos,highlightingthebiggest
threatseachweekandothersecuritynews.
Reference:/newsletters
Q21.WhatarethetwotypesofmanagedIntercloudFabricdeploymentmodels?(Choose
two)
A.ServiceProvidermanaged
B.Publicmanaged
C.Hybridmanaged
D.Usermanaged
E.Enterprisemanaged
Answer:AE
Explanation:
Manyenterprisesprefertodeploydevelopmentworkloadsinthepubliccloud,primarilyfor
convenienceandfasterdeployment.ThisapproachcancauseconcernforITadministrators,
whomustcontroltheflowofITtrafficandspendingandhelpensurethesecurityofdataand
intellectualproperty.Withouttheproper
controls,dataandintellectualpropertycanescapethisoversight.TheCiscoIntercloudFabric
solutionhelpscontrolthisshadowIT,discoveringresourcesdeployedinthepubliccloud
outsideITcontrolandplacingtheseresourcesunderCiscoIntercloudFabriccontrol.Cisco
IntercloudFabricaddressestheclouddeploymentrequirementsappropriatefortwohybrid
clouddeploymentmodels:EnterpriseManaged(anenterprisemanagesitsowncloud
environments)andServiceProviderManaged(theserviceprovideradministersandcontrols
allcloudresources).
Reference:
https://www.cisco.eom/c/en/us/td/docs/solutions/Hybrid_Cloud/lntercloud/lntercloud
_Fabric.pdf
TheCiscoIntercloudFabricarchitectureprovidestwoproductconfigurationstoaddressthe
followingtwoconsumptionmodels:
+CiscoIntercloudFabricforBusiness
+CiscoIntercloudFabricforProvidersReference:
https://www.cisco.eom/c/en/us/td/docs/solutions/Hybrid_Cloud/lntercloud/lntercloud
_Fabric/lntercloud_Fabric_2.html
Q22.WhataretwoDDoSattackcategories?(Choosetwo)
A.sequential
B.protocol
C.database
D.volume-based
E.screen-based
Answer:BD
Explanation:
Therearethreebasiccategoriesofattack:
+volume-basedattacks,whichusehightraffictoinundatethenetworkbandwidth+protocol
attacks,whichfocusonexploitingserverresources+applicationattacks,whichfocusonweb
applicationsandareconsideredthemostsophisticatedandserioustypeofattacksReference:
/networks/types-of-ddos-attacks/
Q23.Refertotheexhibit.
Whichtypeofauthenticationisinuse?
A.LDAPauthenticationforMicrosoftOutlook
B.POP3authentication
C.SMTPrelayserverauthentication
D.externaluserandrelaymailauthentication
Answer:D
Explanation:
TheTLSconnectionsarerecordedinthemaillogs,alongwithothersignificantactionsthat
arerelatedtomessages,suchasfilteractions,anti-virusandanti-spamverdicts,anddelivery
attempts.IfthereisasuccessfulTLSconnection,therewillbeaTLSsuccessentryinthemail
logs.Likewise,afailedTLSconnectionproducesaTLSfailedentry.Ifamessagedoesnothave
anassociatedTLSentryinthelogfile,thatmessagewasnotdeliveredoveraTLSconnection.
Reference:
info,:NewSMTPICID3CinterfaceManageinent(15
addressIC).128.128.200reversednshostu.nknc
Info:ICID30ACCEPTSGSUSPECTLIST^a-chsbrs|
Info:ICID30TLSsuccessprotocolTL5vlciphei
Info:SMTPAuth:(ICID30)succeededforuser:
AUTEmechanism:LOGINwithprofile:lclap_sir.t
Info:MID60matchedallrecipien'csforper-rec
DEFAULTintheoutboundtable
Q24AnorganizationreceivedalargeamountofSPAMmessagesoverashorttimeperiod.
Inordertotakeactiononthemessages,itmustbedeterminedhowharmfulthemessages
areandthisneedstohappendynamically.
Whatmustbeconfiguredtoaccomplishthis?
A.ConfiguretheCiscoWSAtomodifypoliciesbasedonthetrafficseen
B.ConfiguretheCiscoESAtoreceivereal-timeupdatesfromTalos
C.ConfiguretheCiscoWSAtoreceivereal-timeupdatesfromTalos
D.ConfiguretheCiscoESAtomodifypoliciesbasedonthetrafficseen
Answer:D
Explanation:
TheMailPoliciesmenuiswherealmostallofthecontrolsrelatedtoemailfilteringhappens.
Allthesecurityandcontentfilteringpoliciesaresethere,soit'slikelythat,asanESA
administrator,thepagesonthismenuarewhereyouarelikelytospendmostofyourtime.
IRONPORTC160
Monitor
EmailSecurityH^naucr
Overyjjewinco?ni4ngMail=ides
JCCOEEComFibers
SystemOverview6262POkCaM
Out901n9ContentFilters
5sB3-Top3byVifVSThr??L
HWAccessTable(HAT>
s%FullMem4es
SysHATOverview
11.6%|______|7S1
IncomingMesug-MailHowPogoes
0.1%|385
mVExc-epbonTable
0.0%_______|i0.0%_
RecipientAxxessTable(RAT)
SystemStAtusDetailsO?£tifvat)OHControlsOutbreakOc<4
BounceVenfication
DataLx*Prevention(DLP)
ThneRange:|D?y~
OLPPol?cyHaoacer
01Feb201114:00to02
OomamKeys
IncomingHallStBrnmary
|StoppedbyReputationFilte
ShoppedasInvalidReopier
SpamDetected
.AdditionalSpamdetectedt
?IntelligentMUIH-SSG
■Virusd
StoppedbyContentFilter
Q25,WhataretwodifferencesbetweenaCiscoWSAthatisrunningintransparentmodeand
onerunninginexplicitmode?(Choosetwo)
A.WhentheCiscoWSAisrunningintransparentmode,itusestheWSA'sownIPaddress
astheHTTPrequestdestination.
B.TheCiscoWSArespondswithitsownIPaddressonlyifitisrunninginexplicitmode.
C.TheCiscoWSAisconfiguredinawebbrowseronlyifitisrunningintransparentmode.
D.TheCiscoWSAusesaLayer3devicetoredirecttrafficonlyifitisrunningintransparent
mode.
E.TheCiscoWSArespondswithitsownIPaddressonlyifitisrunningintransparentmode.
Answer:DE
Explanation:
TheCiscoWebSecurityAppliance(WSA)includesawebproxy,athreatanalyticsengine,
antimalware
engine,policymanagement,andreportinginasinglephysicalorvirtualappliance.Themain
useoftheCiscoWSAistoprotectusersfromaccessingmaliciouswebsitesandbeinginfected
bymalware.YoucandeploytheCiscoWSAintwodifferentmodes:
?Explicitforwardmode
?Transparentmode
Inexplicitforwardmode,theclientisconfiguredtoexplicitlyusetheproxy,subsequently
sendingallwebtraffictotheproxy.Becausetheclientknowsthereisaproxyandsendsall
traffictotheproxyinexplicitforwardmode,theclientdoesnotperformaDNSlookupofthe
domainbeforerequestingtheURL.TheCiscoWSAisresponsibleforDNSresolution,aswell.
Client&Firewall
webbrowser
WhenyouconfiguretheCiscoWSAinexplicitmode,youdonotneedtoconfigureanyother
networkinfrastructuredevicestoredirectclientrequeststotheCiscoWS
Internet1.Userii
2.ASAF
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025廣東依頓電子科技股份有限公司招聘HRBP崗人員模擬試卷有完整答案詳解
- 2025北京清華附中上莊學(xué)校招聘模擬試卷及完整答案詳解一套
- 2025年永新縣面向社會公開招聘城市社區(qū)專職網(wǎng)格員【37人】考前自測高頻考點模擬試題及一套參考答案詳解
- 2025年開封杞縣消防救援大隊招聘政府專職消防員10人考前自測高頻考點模擬試題附答案詳解
- 2025年金華永康市醫(yī)療衛(wèi)生單位招聘事業(yè)單位工作人員39人模擬試卷及一套答案詳解
- 2025海南文昌市人民醫(yī)院編外工作人員招聘(9號)考前自測高頻考點模擬試題附答案詳解(考試直接用)
- 2025呼倫貝爾市發(fā)展和改革委員會競爭性比選事業(yè)單位工作人員考前自測高頻考點模擬試題有完整答案詳解
- 2025年云數(shù)融合項目發(fā)展計劃
- 2025北京回龍觀醫(yī)院招聘2人(第三批)考前自測高頻考點模擬試題及參考答案詳解一套
- 2025江蘇泰州學(xué)院招聘專職輔導(dǎo)員和專任教師17人考前自測高頻考點模擬試題及答案詳解1套
- 執(zhí)法監(jiān)督培訓(xùn)課件
- 股權(quán)投資基金培訓(xùn)課件
- 千川投手培訓(xùn)課件
- 2025年中國注塑機熔膠筒螺桿市場調(diào)查研究報告
- 職業(yè)培訓(xùn)班級管理制度
- 第一章第二節(jié)《孟德爾自由組合定律應(yīng)用9331變形及致死現(xiàn)象》課件-人教版必修二
- DB31/T 1093-2018混凝土砌塊(磚)用再生骨料技術(shù)要求
- 培訓(xùn)機構(gòu)教務(wù)老師工作計劃
- 2025新人教版美術(shù)一年級下冊《難忘的童年》教學(xué)設(shè)計教案
- 《樂東黎族自治縣國土空間總體規(guī)劃 (2020-2035)》
- 2025年五荒土地承包合同
評論
0/150
提交評論