A.scanning streaming media for malware
B.scanning multiple downloads at the same time
C.passing pieces of a download to the client while the download is being scanned
D.passing scanned pieces of the file between two different malware-scanning engines
您可能感兴趣的试卷
你可能感兴趣的试题
A.a list of proxy servers that are to be bypassed
B.a list of clients and destinations that will bypass the proxy in transparent mode
C.a list of clients and destinations that will bypass the proxy in explicit forward mode
D.a list of user agents exempt from authentication
A.client reports will display authenticated usernames
B.client reports will display both the username and IP address of the clients
C.client reports are not affected by authentication
D.client reports will display the IP address of the authentication server
最新试题
Which file characteristic cannot be used in the Cisco IronPort Data Security policies?()
Which of these is not an action that is associated with HTTPS decryption policies?()
What are PAC files used for?()
Bandwidth limits cannot be:()
Which of the following is true about Outbound Malware Scanning?()
If a web site is blocked because it has a low web reputation score, which of the following iscontained in the un-customized End-User Notification?()
Which of these can not be used in defining policies?()
Which of these user ICAP?()
Which statement about the DVS engine is true?()
For WSA SaaS Access Control, the Identity Provider is:()