A.to process traffic that is not intended for its MAC address
B.to transmit TCP reset packets
C.to bind with other promiscuous mode ports
D.to receive Ethernet broadcasts
您可能感兴趣的试卷
你可能感兴趣的试题
A.resetconfig
B.restoreconfig
C.loadconfig
D.reload
A. drop
B. pass-through
C. decrypt
D. block
A. explicit forward mode proxy deployments
B. L4TM
C. transparent mode proxy deployments
D. user agent-based policies
A. the destination was manually added to the block list
B. the malware category is set to blocking mode
C. the transaction was blocked because of application or object properties
D. the transaction was manually blocked by the administrative user
A.time of day
B.user agent
C.proxy port
D.usage quotas
A. the proxy blocked an outbound request because the client is infected with malware
B. the proxy blocked access to a site with a low reputation score
C. the proxy blocked access to a site because of a suspicious server response
D. your appliance or the WBRS key is out of support
A.if enabled, all HTTPS traffic must be decrypted
B.if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decrypted
C.decrypted HTTPS traffic is sent unencrypted across the enterprise intranet
D.object size can be used to determine whether the HTTPS traffic is to be decrypted
A.the DVS engine can useWebroot and McAfee scanning in parallel
B.the DVS engine generates the WBRS
C.the DVS engine never inspects the client HTTP request
D.the DVS engine is only used for Layer 4 traffic monitoring
A.it is not recommended: the system will not detect more malware
B.it is notpossible : the WSA will accept only one anti-malware license
C.the system will stop all web-based threats
D.it is recommended: the system will detect more malware
A. both active and passive modes FTP are supported
B. by default the FTP proxy uses port 8021
C. access polices may apply to native FTP traffic
D. data loss prevention policies may apply to native FTP traffic
E. authentication is supported in transparent mode
最新试题
Which of these is a drawback in using McAfee heuristic scanning?()
What are PAC files used for?()
Match the troubleshooting tool with one of its features or functions.
Which of the following is NOT provided by AVC?()
In AsyncOS 7.0 for web the choice of Authentication Surrogate is?()
Which of these is the best way to convince a prospect of the benefits of the S-Series?()
Which of these can not be used in defining policies?()
Match the log file with its role in troubleshooting.
Put the following features in the order they are applied.
Which of the following is true about Outbound Malware Scanning?()