1.
What version of the Cisco PIX Firewall is required to use the VPN accelerator card?
2.
You are the administrator at Certkiller Inc. and you need pick a device to help you secure the network. Which device in the SAFE SMR midsize network design corporate Internet module determines when to provide TCP shunning or resets?
3.
You are the leader of the security team at Certkiller Inc and you are working on mitigation trust exploitation attacks. How is trust exploitation attacks mitigated in the SAFE SMR midsize network design corporate Internet module?
4.
Jason the security administrator at Certkiller Inc is working on dial in users for the network. In the SAFE SMR midsize network design, which module does dial-in traffic terminate?
5.
You are the security administrator at Certkiller Inc and you need to authenticate users to the network. After being authenticated, which actions are performed on dial-in access users in the SAFE SMR midsize network design corporate Internet module?
6.
In which module does VPN traffic terminate in the SAFE SMR midsize network design?
7.
In the corporate Internet module of SAFE SMR midsize network design, following termination of the VPN tunnel, traffic is sent through:
8.
How is denial of service attacks mitigated in the SAFE SMR midsize network design corporate Internet module?
9.
How are application layer attacks mitigated in the SAFE SMR midsize network design corporate Internet module?
10.
What is the primary function of the firewall in the SAFE SMR midsize network design corporate Internet module?