网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which of the following is BEST for providing network security?()

  • A、Firewall
  • B、DMZ
  • C、Switch
  • D、IDS

参考答案

更多 “Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS” 相关考题
考题 A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()A. Docking stationB. Self powered USB hubC. KVM switchD. Non-powered USB hub

考题 A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle

考题 Which of the following is BEST for providing network security?() A.FirewallB.DMZC.SwitchD.IDS

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A. WEP encryptionB. Channel rotationC. Disable SSIDD. WPA encryption

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall

考题 Which of the following network hardware allows the MOST network traffic collisions?() A.WAPB.HubC.SwitchD.Router

考题 Which one of the following is the most commonly used layer 2 network device?() A. HubB. BridgeC. SwitchD. RouterE. RepeatersF. None of the above

考题 Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices

考题 Which of the following is not a typical maintenance task within a network maintenance model?()A、Providing technical customer supportB、Changing configurationsC、Updating softwareD、Monitoring network performanceE、Replacing hardwareF、Scheduling backups

考题 Which of the following network hardware allows the MOST network traffic collisions?()A、WAPB、HubC、SwitchD、Router

考题 A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()A、WEP encryptionB、Channel rotationC、Disable SSIDD、WPA encryption

考题 Which of the following BEST describes a hub?()A、Determines the best route to transmit dataB、Inspects traffic and accepts or declines transmissionC、Broadcasts data to specific network devicesD、Broadcasts data to all network devices

考题 Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

考题 Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A、 ARPB、 DMZC、 VLAND、 VPN

考题 A customer, who brings their laptop to work on a daily basis, calls to ask for the best way to add USB ports and an additional network card to their laptop. Which of the following would meet the user’s requirements?()A、Docking stationB、Self powered USB hubC、KVM switchD、Non-powered USB hub

考题 Which two statements best describe the Cisco Unified Wireless Network?()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.B、 The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANsC、 The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.D、 The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.

考题 Which one of the following is the most commonly used layer 2 network device?()A、HubB、BridgeC、SwitchD、RouterE、RepeatersF、None of the above

考题 For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()A、VPN concentratorB、Virtual serversC、WirelessD、Multimode fiber

考题 When configured. MPLS can increase routing redundancy by providing which of the following network topology types?()A、BusB、MeshC、MultipathD、Ring

考题 Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.

考题 A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 单选题Which of the following is BEST for providing network security?()A FirewallB DMZC SwitchD IDS

考题 单选题Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A HoneynetB HoneypotC Vulnerability scannerD Network based IDS

考题 单选题Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A  ARPB  DMZC  VLAND  VPN

考题 多选题Which two statements best describe the Cisco Unified Wireless Network?()AThe Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.BThe Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANsCThe Cisco Unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.DThe Cisco unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.