网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
A

a list of existing network applications currently in use on the network

B

network audit results to uncover any potential security holes

C

a planned Layer 2 design solution

D

a proof-of-concept plan

E

device configuration templates


参考答案

参考解析
解析: 暂无解析
更多 “多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates” 相关考题
考题 Which two requirements would lead towards a high availability solution?() A.When uptime is criticalB.When data must be refactoredC.When application concurrency is staticD.When data loss is unacceptableE.When application is a single point of failure

考题 Which two statements are true regarding firewall user authentication?() (Choose two.) A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 Which two are advantages of static routing when compared to dynamic routing?() A.Security increases because only the network administrator may change the routing tablesB.Configuration complexity decreases as network size increasesC.Routing updates are automatically sent to neighborsD.Route summarization is compued automatically by the routerE.Routing traffic load is reduced when used in stub network linksF.An efficient algorithm is used to build routing tables,using automatic updatesG.Routing tables adapt automatically to topology changes.

考题 What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

考题 When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

考题 Which two actions, when taken in combination, will result in an effective network security solution?()A、 develop a policy for securing the networkB、 monitor and test network activities for vulnerabilitiesC、 implement reflexive access listsD、 implement dynamic access listsE、 select and implement a single comprehensive virus protection program

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Which two statements are true regarding firewall user authentication?() (Choose two.)A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

考题 Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A、 CiscoWorks Security Device Management Center (SD/MC)B、 Security Device Manager (SDM)C、 Adaptive Security Device Manager (ASDM)D、 CiscoWorks VMS/Management Center (VMS/MC)

考题 A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

考题 Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

考题 The Solutions Recommendation Guide is a framework for creating a customized SMB solution. Inorder to create a customized solution, which two components are needed?()A、implementation ratings determinedB、specific products and technology availableC、benefits to the business decidedD、business capabilities enabledE、business challenges identified

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 Which two are advantages of static routing when compared to dynamic routing?()A、Security increases because only the network administrator may change the routing tablesB、Configuration complexity decreases as network size increasesC、Routing updates are automatically sent to neighborsD、Route summarization is compued automatically by the routerE、Routing traffic load is reduced when used in stub network linksF、An efficient algorithm is used to build routing tables,using automatic updatesG、Routing tables adapt automatically to topology changes.

考题 In which two ways does an integrated security solution reduce TCO? ()A、 by enabling businesses to leverage investments in the networkB、 by spending less time addressing attacksC、 by enforcing policy complianceD、 through admission control

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 Which two statements are true regarding firewall user authentication?()A、When configured for pass-through firewall user authentication, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.B、When configured for Web firewall user authentication only, the user must first open a connection to the JUNOS security platform before connecting to a remote network resource.C、If a JUNOS security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted to perform authentication.D、If a JUNOS security device is configured for Web firewall user authentication, new sessions are automatically intercepted to perform authentication.

考题 You are creating a destination NAT rule-set. Which two are valid for use with the from clause?()A、security policyB、interfaceC、routing-instanceD、IP address

考题 Which two requirements would lead towards a high availability solution?()A、When uptime is criticalB、When data must be refactoredC、When application concurrency is staticD、When data loss is unacceptableE、When application is a single point of failure

考题 多选题Which two actions, when taken in combination, will result in an effective network security solution?()Adevelop a policy for securing the networkBmonitor and test network activities for vulnerabilitiesCimplement reflexive access listsDimplement dynamic access listsEselect and implement a single comprehensive virus protection program

考题 多选题Which two are true about has-a and is-a relationships?()AInheritance represents an is-a relationship.BInheritance represents a has-a relationship.CInterfaces must be used when creating a has-a relationship.DInstance variables can be used when creating a has-a relationship.

考题 多选题When HSRP is configured on a network, which two of these items are provided, which are shared between the routers that run HSRP ?() (choose two)AShared single interfaceBIP AddressCTCP-based hello packetsDMAC address

考题 单选题The Solutions Recommendation Guide is a framework for creating a customized SMB solution. Inorder to create a customized solution, which two components are needed?()A implementation ratings determinedB specific products and technology availableC benefits to the business decidedD business capabilities enabledE business challenges identified

考题 单选题Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()A  CiscoWorks Security Device Management Center (SD/MC)B  Security Device Manager (SDM)C  Adaptive Security Device Manager (ASDM)D  CiscoWorks VMS/Management Center (VMS/MC)

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB detailed security device specificationsC results from pilot network testingD results from a network audit

考题 多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network

考题 多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization