考题
ActiveX is the name(66)has given to a set of object-oriented concepts, technologies, and tools. It is important to notice that ActiveX is not a(67)technology, but a brand name, what it's applied to can vary over time. However, the main technology is COM. Used in a network with a(68)and additional support, COM becomes the DCOM. The main object that is created when writing a program to run in the ActiveX environment is a(69), a self-sufficient program that can be run anywher6 in the ActiveX network. This component is known as an "ActiveX control". An ActiveX control is roughly equivalent to a applet. One important difference is that an ActiveX control must be(70)for a specific platform, while an applet is platform-independent.A.HPB.CiscoC.SUND.Microsoft
考题
NAC's(Network Access Control)role is to restrict network access to only compliant endpoints and(66)users. However, NAC is not a complete LAN(67)solution; additional proactive and(68)security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security(69). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures — real-time, multilevel(70)inspection and microsecond threat containment.A.automatedB.distinguishedC.authenticatedD.destructed
考题
NAC's (Network Access Control)role is to restrict network access to only compliant endpoints and (1) users. However, NAC is not a complete LAN (2) solution; additional proactive and (3) security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 100Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security (4) In addition to NAC, enterprises need to implement role--based network access control as well as critical proactive security measures-real-time, multilevel (5) inspection and microsecond threat containment.A. automatedB.distinguishedC.authenticatedD.destructed
考题
NAC's(Network Access Control) role is to restrict network access to only compliant endpoints and(66) users. However, NAC is not a complete LAN(67) solution; additional proactive and(68) security measures must be implemented, Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security(69). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures—real-time, multilevel(70) inspection and microsecond threat containment.A.automatedB.distinguishedC.authenticatedD.destructed
考题
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP
考题
Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()
A. State synchronization occurs only through the internal network interface card (NIC)B. Latency of the WAN must be less than 300 ms.C. Authenticating endpoints must be on the same LAN segment.D. Cluster members must use the same hardware platfor
考题
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
A. NAC can authenticate using 802.1X and IBNS cannotB. NAC can ensure only compliant machines connect and IBNS cannotC. NAC can ensure access to the correct network resources and IBNS cannotD. NAC can manage user mobility and reduce overhead costs and IBNS cannot
考题
To access information on the Intemet,a user must first log on to the client computer'S______network.A.serverB.clientC.hostD.self
考题
NAC's(Network Access Control)role is to restrict network access to only compliant endpoints and(请作答此空)users.However,NAC is not a complete LAN( )solution;additional proactive and( )security measures must be implemented,Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps,ensuring a high level of security plus application availability and performance.Nevis integrates NAC as the first line of LAN security( ).In addition to NAC,enterprises need to implement role-based network access control as well as critical proactive security measures—real-time,multilevel( )inspection and microsecond threat containment.A.automated
B.distinguished
C.authenticated
D.destructed
考题
NAC's (Network Access Control) role is to restrict network access to only compliant endpoints and ( )users. However, NAC is not a complete LAN(请作答此空)solution; additional proactive and ( )security measures must be implemented, Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security( ). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures—real-time, multilevel( )inspection and microsecond threat containment.A.crisis
B.security
C.favorable]
D.excellent
考题
NAC's (Network Access Control) role is to restrict network access to only compliant endpoints and (请作答此空)users. However, NAC is not a complete LAN( )solution; additional proactive and ( )security measures must be implemented, Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security( ). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures—real-time, multilevel( )inspection and microsecond threat containment.A.automated]
B.distinguished]
C.authenticated]
D.destructed]
考题
Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complex
B.unique
C.catchy
D.long
考题
What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。A、Allow unrestricted access to the console or VTY portsB、Use a firewall to restrict access from the outside to the network devicesC、Always use Telnet to access the device command line because its data is automatically encryptedD、Use SSH or another encrypted and authenticated transport to access device configurationsE、Prevent the loss of passwords by disabling password encryption
考题
pany is deploying a Cisco autonomous WLAN solution in their network. Which three components are included in this solution?()A、 Wireless Domain Services (WDS)B、 Access Control Server (ACS)C、 Lightweight Access Point Protocol (LWAPP)D、 Wireless LAN solution Engine (WLSE)E、 Wireless Services Module (WISM)F、 Wireless Control System (WCS)
考题
Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()A、State synchronization occurs only through the internal network interface card (NIC)B、Latency of the WAN must be less than 300 ms.C、Authenticating endpoints must be on the same LAN segment.D、Cluster members must use the same hardware platfor
考题
As the Company wireless administrator, you required to be knowledgeable about the wireless LAN components. Which two statements about these components are true? ()A、 In the autonomous access point solution, control is provided by the WLAN controller.B、 In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).C、 In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).D、 Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.E、 Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).F、 Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
考题
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()A、NAC can authenticate using 802.1X and IBNS cannotB、NAC can ensure only compliant machines connect and IBNS cannotC、NAC can ensure access to the correct network resources and IBNS cannotD、NAC can manage user mobility and reduce overhead costs and IBNS cannot
考题
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A、Source IP and browserB、Source IP and certificateC、Certificate and Host CheckerD、Host Checker and source IP
考题
An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()A、The vendor must select a role from a list of eligible roles.B、The vendor must select a rule from a list of eligible rules.C、The vendor is automatically mapped to the first configured roleD、The vendor is automatically granted a merged role.
考题
You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()A、The endpoints can use agentless access.B、Encrypted traffic flows between the endpoint and the enforcer.C、Encrypted traffic flows between the endpoint and the protected resourceD、The endpoints can use the Odyssey Access Client.
考题
Your company has an Active Directory forest named contoso.com. You plan to deploy an Exchange Server 2010 organization that will contain two servers. Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed. You plan to add both servers to a database availability group (DAG). You need to recommend a high-availability solution for the Client Access server role. Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable. What should you recommend?()A、Create and configure a Client Access server array, and then install a hardware load balancer.B、Create and configure a Client Access server array, and then install Windows Network Load Balancingon both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then install Windows network Load Balancing.
考题
You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks
考题
Your network consists of an Active Directory forest that contains two sites named Site1 and Site2. From the Internet, users can only access servers in Site1. You have an Exchange Server 2007 organization. Each site contains servers that run the Client Access server role, the Mailbox server role, and the HubTransport server role. You plan to transition the organization to Exchange Server 2010. You need to recommend the server role that you must transition first to Exchange Server 2010. Your solution must provide the least amount of downtime for users in the organization. Which servers should you transition first?()A、the Client Access servers in Site1B、the Client Access servers in Site2C、the Hub Transport servers in Site1D、the Hub Transport servers in Site2
考题
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A、 Configure Internet Authentication Service (IAS) for accounting.B、 Configure the server running Routing and Remote Access to support L2TP.C、 Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D、 Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
考题
单选题You are designing a security strategy for users who need remote access to the corporate network. What should you do?()A
Configure Internet Authentication Service (IAS) for accounting.B
Configure the server running Routing and Remote Access to support L2TP.C
Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.D
Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
考题
单选题An outside vendor is eligible for the guest role and the contractor role when accessing your network, that is secured with the Junos Pulse Access Control Service.What is the default role-mapping behavior?()A
The vendor must select a role from a list of eligible roles.B
The vendor must select a rule from a list of eligible rules.C
The vendor is automatically mapped to the first configured roleD
The vendor is automatically granted a merged role.
考题
多选题pany is deploying a Cisco autonomous WLAN solution in their network. Which three components are included in this solution?()AWireless Domain Services (WDS)BAccess Control Server (ACS)CLightweight Access Point Protocol (LWAPP)DWireless LAN solution Engine (WLSE)EWireless Services Module (WISM)FWireless Control System (WCS)