网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
What are two characteristics of the SDM Security Audit wizard?()
A

displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement

B

has two modes of operationinteractive and non-interactive

C

automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router

D

uses interactive dialogs and prompts to implement role-based CLI

E

requires users to first identify which router interfaces connect to the inside network and which connectto the outside network


参考答案

参考解析
解析: 暂无解析
更多 “多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network” 相关考题
考题 What are two security appliances that can be installed in a network?() A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM

考题 What are two characteristics of Telnet (Choose two.)()。 A.Itsendsdataincleartextformat.B.ItisnolongersupportedonCisconetworkdevices.C.ItismoresecurethanSSHD.Itrequiresanenterpriselicenseinordertobeimplemented.E.ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

考题 What are two security appliances that can be installed in a network (Choose two.)()。 A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM

考题 What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

考题 What are two characteristics of Telnet (Choose two.)()。A、Itsendsdataincleartextformat.B、ItisnolongersupportedonCisconetworkdevices.C、ItismoresecurethanSSHD、Itrequiresanenterpriselicenseinordertobeimplemented.E、ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

考题 What are two of the three predefined classes for the Cisco SDM wizard?()A、business-critical B、high priority C、middle classD、voiceE、best effortF、scavenger

考题 What are two security appliances that can be installed in a network? ()A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM

考题 What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()A、AlarmSeverityB、AlarmKeepaliveC、AlarmTraitsD、EventMediaE、EventAlarmF、EventAction

考题 What are three characteristics that buyers of Cisco Small Business routers typically look for?()A、 basic security optionsB、 simple network configurationC、 advanced network configurationD、 integrated solutionsE、 advanced security optionsF、 point products

考题 For which two types of applications can the SDM provide wizards?()A、 security servicesB、 TACACS+servicesC、 Mpls servicesD、 Routing servicesE、 Ppp0e servicesF、 Poe services

考题 Which three statements are valid SDM configuration wizards? ()A、NATB、VPNC、STPD、Security Audit

考题 What are two security appliances that can be installed in a network? (Choose two.)()  A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM

考题 As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()A、to provide a keepalive mechanismB、to pull event logs from the routerC、to extract relevant SNMP informationD、to perform application-level accounting

考题 You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

考题 Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above

考题 You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.

考题 多选题What are the characteristics of the process of documenting the layers of an existing network? ()Abegins with gathering organizational input that may be inaccurateBbegins with gathering organizational input that does not need to be supplemented by a network auditCrequires a network audit to support some upgrade decisionsDrequires a network audit to support any network restructuringEprovides reliable input for verifying network consistencyFdoes not provide reliable input for designing changes

考题 多选题Which two are characteristics of the cost-containment business challenge?()Areducing security breachesBusing the Internet moreCreducing upgrade chargesDadopting new applications and services

考题 单选题For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM wizardthat performs similar configuration functions?()A aaa configuration commands and the SDM Basic Firewall wizardB setup exec command and the SDM Security Audit wizardC auto secure exec command and the SDM One-Step Lockdown wizardD Cisco Common Classification Policy Language configuration commands and the SDM Site-to- Site VPN

考题 多选题What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()AAlarmSeverityBAlarmKeepaliveCAlarmTraitsDEventMediaEEventAlarmFEventAction

考题 多选题What are two of the three predefined classes for the Cisco SDM wizard?()Abusiness-criticalBhigh priorityCmiddle classDvoiceEbest effortFscavenger

考题 多选题Which three statements are valid SDM configuration wizards? ()ANATBVPNCSTPDSecurity Audit

考题 多选题What are two security appliances that can be installed in a network? ()AATMBIDSCIOSDIOXEIPSFSDM

考题 多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

考题 多选题What are two characteristics of Telnet (Choose two.)()。AItsendsdataincleartextformat.BItisnolongersupportedonCisconetworkdevices.CItismoresecurethanSSHDItrequiresanenterpriselicenseinordertobeimplemented.EItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

考题 多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM

考题 多选题What are three characteristics that buyers of Cisco Small Business routers typically look for?()Abasic security optionsBsimple network configurationCadvanced network configurationDintegrated solutionsEadvanced security optionsFpoint products