ISA Server 2006 features extensive rule matching abilities. Which of the following lists has the proper order for how ISA Server 2006 checks rule elements that make up an Access rule?
Answer : A
You are configuring your new Intrusion Detection System, and studying the true-false matrix. You read about the different types of alarms and events. Which of the following defines an event where an alarm is indicating an intrusion when there is no actual intrusion?
Answer : B
You have decided to implement SSH for communicating to your router. What does SSH use to establish a secure channel of communication?
Answer : A
Your network traffic has increased substantially over the last year, and you are looking into your caching options for frequently visited websites. What are the two types of caching that ISA Server 2006 supports?
Answer : A, B
You are configuring your Snort rules and you wish to tell Snort to log and send notice when a type of packet is received, what rule action syntax will you use?
Answer : A
What tool used in wireless network analysis has the ability to output its findings to MapPoint?
Answer : A
You are configuring a L2TP solution between your office and your primary branch office. The CEO has requested a report on the benefits of using this technology. Which of the following benefits does L2TP (with IPSec) provide?
Answer : B, D, E