问题:
A . It can be configured to block Java traffic.
B . It can be configured to detect and prevent SYN-flooding denial-of-service (DoS) network attacks.
C . It can only examine network layer and transport layer information.
D . It can only examine transport layer and application layer information.
E . The inspection rules can be used to set timeout values for specified protocols.
F . The ip inspect cbac-name command must be configured in global configuration mode.
● 参考解析
本题暂无解析
相关内容
相关标签