As part of your branch office security design, you are asked to include the necessary features to address these requirements:-stop spam and phishing,-stop viruses, Trojans, and spyware,-control website access, and-control contentWhich security feature set meets these requirements?
An auditor reviewed your companys firewall configurations and is requiring that IPsec VPN connections must not expose IKE identities during IKE negotiations.Which two methods satisfy this requirement? (Choose two.)
Which three methods secure the payload across the WAN? (Choose three.)
You are designing an enterprise WAN network that must connect multiple sites. You must provide a design proposal for the security elements needed to encrypt traffic between the remote sites.Which feature will secure the traffic?
Your companys data center uses multiple routing instances on shared hardware, but needs to share routing information between routing instances.In this scenario, what are three ways to share routes between routing instances? (Choose three.)
You are designing a Log Director deployment that must be able to handle 9,500 sustained events per second.In this scenario, what is the minimum deployment solution?