Which component triggers the quarantine of an infected endpoint?
ALG
firewall
Policy Enforcer
switch
Correct answer: C
Question 2
You are designing a data center network that will require the rapid deployment and removal of security features between virtual machines based on triggered traffic flows. The data center will require the ability to scale up and down rapidly according to traffic load, and then release resources when security services are not needed.
In this scenario, which type of security design would fulfill this requirement?
a centralized security appliance
a container-based security deployment
a physical security device connected to each host
an all-in-one virtual security device in each host
Correct answer: B
Question 3
Referring to the exhibit, you are designing a Layer 2 data center and you want to make sure that all the links between the access tier and the aggregation tier are used.