网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()
A

 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.

B

 Port scanners are the most effective defense against dynamic ARP inspection.

C

 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.

D

 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.

E

 DHCP snooping sends unauthorized replies to DHCP queries.

F

 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.

G

 None of the other alternatives apply.


参考答案

参考解析
解析: 暂无解析
更多 “单选题The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A  MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B  Port scanners are the most effective defense against dynamic ARP inspection.C  MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D  Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E  DHCP snooping sends unauthorized replies to DHCP queries.F  ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G  None of the other alternatives apply.” 相关考题
考题 Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection()。A.UTP cableB.STP cableC.coaxial cableD.fiber optic cable

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 You are the Cisco Network Designer in Cisco.com. In your company site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()A、Layer 2 modeB、Layer 2 Edge modeC、Layer 3 modeD、Layer 3 In-Band mode

考题 Which deployed VoWLAN client security option is recommended by Cisco?()A、Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB、Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC、Layer 3 with Layer 3 Security set to VPN Pass-ThroughD、Layer 2 with Layer 2 Security set to 802.1X

考题 The Company is concerned about Layer 2 security threats.  Which statement is true about these  threats? ()A、 MAC spoofing attacks allow an attacking device to receive frames intended for a different  network host.B、 Port scanners are the most effective defense against dynamic ARP inspection.C、 MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable  attack points.D、 Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP  snooping attacks.E、 DHCP snooping sends unauthorized replies to DHCP queries.F、 ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.G、 None of the other alternatives apply.

考题 A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()A、 RAIDB、 tape libraryC、 optical storageD、 disk to disk to tape

考题 An administrator is concerned about users utilizing the company's wireless signal with their personal laptops. Which of the following is the BEST method to use to prevent unauthorized devices from using the company's wireless network?()A、Secure VPNB、MAC filteringC、IP filteringD、Static IP addresses

考题 Which two statements are correct about Layer 2 broadcast frames?()A、Layer 2 broadcast frames are processed by all devices on the same VLANB、Layer 2 broadcast frames are are discarded by routers that connect to multiple VLANsC、Layer 2 broadcast frames are relayerd by routers to all connected VLANsD、Layer 2 broadcast frames are relayed by switches to devices on the same VLAN

考题 SSL的全称是()。A、Session Socket LanguageB、Session Software LanguageC、Security Socket LayerD、Security Software Layer

考题 Which statement about data center access layer design modes is correct?()A、The access layer is the first oversubscription point in a data center design.B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

考题 The Company security administrator is concerned with VLAN hopping based attacks. Which two  statements about these attacks are true? ()A、 Attacks are prevented by utilizing the port-security feature.B、 An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the  802.1q encapsulation.C、 Configuring an interface with the switchport mode dynamic command will prevent VLAN  hopping.D、 An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q  encapsulation.E、 Configuring an interface with the "switchport mode access" command will prevent VLAN  hopping.

考题 Two buildings on the San Jose campus of a small company must be connected to use Ethernet with a bandwidth of at least 100 Mbps. The company is concerned about possible problems from voltage potential differences between the two buildings. Which media type should be used for the connection()。A、UTP cableB、STP cableC、coaxial cableD、fiber optic cable

考题 XYZ LTD is concerned about the security in the perimeter of the network. Which three Cisco products can you offer to XYZ LTD?()A、Integrated Services RoutersB、Firewall AppliancesC、Cisco Unified CallManagerD、Multilayer switch with enhanced imageE、Cisco UnityF、VPN Concentrators

考题 The Company security administrator is concerned with layer 2 network attacks.  Which two  statements about these attacks are true? ()A、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by encapsulating a  false 802.1Q header on a frame and causing traffic to be delivered to the wrong VLAN.B、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  message with a forged identity to a transmitting host.C、 MAC address flooding is an attempt to force a switch to send all information out every port byoverloading the MAC address table.D、 ARP spoofing attacks are attempts to redirect traffic to an attacking host by sending an ARP  packet that contains the forged address of the next hop router.E、 MAC address flooding is an attempt to redirect traffic to a single port by associating that port  with all MAC addresses in the VLAN.

考题 Your company has an Active Directory Domain Services (AD DS) domain. Al l client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user is authenticated to the RD Session Host server before a session is created. What should you do?()A、Set the security layer op tion to RDP Security Layer.B、Set the encryption level option to FIPS Compliant.C、Set the log on option to Always prompt for password.D、Set the security option to Allow connections only from computers running Remote Desktop with Network Level Authenticat ion.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.A new Company.com security policy prohibits the employees to send certain words between them.What should you do?()A、The best option is to create an Outlook Protection Rule to comply with the Company.com security policy.B、The best option is to set up a content filtering feature to comply with the Company.com security policy.C、The best option is to create a transport rule to comply with the Company.com security policy.D、The best option is to set up a sender reputation feature to comply with the Company.com security policy.

考题 单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题Your company has an Active Directory Domain Services (AD DS) domain. All client computers run Windows 7. You have a Remote Desktop Session Host (RD Session Host) server. You need to ensure that each user is authenticated to the RD Session Host server before a session is created. What should you do?()A Set the security layer option to RDP Security Layer.B Set the encryption level option to FIPS Compliant.C Set the log on option to Always prompt for password.D Set the security option to Allow connections only from computers running Remote Desktop with Network Level Authentication.

考题 单选题A large corporation is concerned about the amount of time it takes to back up their main file server. They are also concerned that their IT technician frequently forgets to change the backup tapes, thereby leaving the company open to data loss. Which backup system would solve both problems?()A  RAIDB  tape libraryC  optical storageD  disk to disk to tape

考题 单选题What is one thing most people don’t associate with Madonna?A She is chief executive of an entertainment company.B She prefers making records to films.C She is not concerned about media attention.

考题 多选题XYZ LTD is concerned about the security in the perimeter of the network. Which three Cisco products can you offer to XYZ LTD?()AIntegrated Services RoutersBFirewall AppliancesCCisco Unified CallManagerDMultilayer switch with enhanced imageECisco UnityFVPN Concentrators

考题 单选题According to the writer, which of the following is not true about your boss?A He is the person who supervises you.B He is the person setting the company’s goals.C He can keep you informed of company direction concerned with your future.D He can help you acquire support or cooperation from other departments.

考题 单选题A corporation is not concerned about wireless use by Teleworkers. Authentication for any application first requires access via a web browser to a protected site. Given these requirements, choose the appropriate security feature to use to enforce the security policy.()A Authentication ProxyB 802.1X C Context-Based Access ControlD Intrusion Detection SystemE Stateful firewall

考题 多选题Your company has 10 servers that run Windows Server 2008 R2. The servers have Remote Desktop Protocol (RDP) enabled for server administration. RDP is configured to use default security settings. All administrators' computers run Windows 7. You need to ensure the RDP connections are as secure as possible. Which two actions should you perform?()ASet the security layer for each server to the RDP Security Layer.BConfigure the firewall on each server to block port 3389.CAcquire user certificates from the internal certification authority.DConfigure each server to allow connections only to Remote Desktop client computers that use Network Level Authentication.

考题 多选题You are meeting with a customer who is concerned about improving employee productivity. Whatare two ways that you should position the Cisco SDN with this customer?()AA Cisco Integrated Security Solution uses the Cisco UN to form a layered and integratednetwork of protection that enables the enforcement of security policies throughout theinfrastructure.BA Cisco Integrated Security Solution provides software tools that allow customers to centrallymanage their network security policies.Cin contrast to point products, the Cisco SDN is a system of defense that leverages the ubiquitous sensing and control capabilities of the network. Each part communicates with the otherto strengthen protection across the entire infrastructure.DA Cisco Integrated Security Solution enables barriers that serve as both physical and virtualprotection against possible threats. Security barriers include firewalls, authentication products,access control products, and tunneling and encryption techniques.

考题 单选题Which deployed VoWLAN client security option is recommended by Cisco?()A Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC Layer 3 with Layer 3 Security set to VPN Pass-ThroughD Layer 2 with Layer 2 Security set to 802.1X

考题 单选题Which statement about data center access layer design modes is correct?()A  The access layer is the first oversubscription point in a data center design.B  When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C  When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D  When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.E  The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.