网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Network Security is a continuous process. Which three phases apply to this process?()
- A、Configure
- B、Improve
- C、Operate
- D、Monitor
- E、Secure
- F、Troubleshooting
参考答案
更多 “Network Security is a continuous process. Which three phases apply to this process?()A、ConfigureB、ImproveC、OperateD、MonitorE、SecureF、Troubleshooting” 相关考题
考题
NAC's(Network Access Control)role is to restrict network access to only compliant endpoints and(66)users. However, NAC is not a complete LAN(67)solution; additional proactive and(68)security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security(69). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures — real-time, multilevel(70)inspection and microsecond threat containment.A.automatedB.distinguishedC.authenticatedD.destructed
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
A network vulnerability scanner is part of which critical element of network and system security?()
A. host securityB. perimeter securityC. security monitoringD. policy management
考题
Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the networkA.complex
B.unique
C.catchy
D.long
考题
Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.A、technology assessmentB、operations assessmentC、security assessmentD、security administrationE、change management
考题
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.B、 Business strategy should directly relate to the security policy and budget.C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.D、 Security should be a continuous process.E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.
考题
What are three characteristics that buyers of Cisco Small Business routers typically look for?()A、 basic security optionsB、 simple network configurationC、 advanced network configurationD、 integrated solutionsE、 advanced security optionsF、 point products
考题
What are the benefit of using Netflow?()A、Network, Application User MonitoringB、Network PlanningC、Security AnalysisD、Accounting/Billing
考题
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()A、Content networkingB、Campus local-area networkingC、Network managementD、Network security
考题
How does the Cisco Security Agent proactively stop both known and unknown attacks?()A、 It reverse engineers and documents the attackB、 It looks subjectively at network traffic for abnormal flows of behaviorC、 It creates a signature and updates the network security policiesD、 It actively monitors all vulnerable areas of the network
考题
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing
考题
What is an ideal Cisco solution to protect a campus network and services from potential security breaches?()A、Cisco Security Device ManagerB、Cisco Security AgentC、Cisco VPN ClientD、Cisco Intrusion Detection System
考题
Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
What is the purpose of a zone in JUNOS Software?()A、A zone defines a group of security devices with a common management.B、A zone defines the geographic region in which the security device is deployed.C、A zone defines a group of network segments with similar security requirements.D、A zone defines a group of network segments with similar class-of-service requirements.
考题
You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()A、From Network and Sharing Center, click Connect to a network.B、From Network and Sharing Center, click Set up a new connection or network.C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.
考题
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()A、From Network Connections, right-click the active network connection, and then click Status.B、From Network Connections, select the active network connection, and then click Diagnose this connection.C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.
考题
多选题Network Security is a continuous process. Which three phases apply to this process?()AConfigureBImproveCOperateDMonitorESecureFTroubleshooting
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题How does the Cisco Security Agent proactively stop both known and unknown attacks?()A
It reverse engineers and documents the attackB
It looks subjectively at network traffic for abnormal flows of behaviorC
It creates a signature and updates the network security policiesD
It actively monitors all vulnerable areas of the network
考题
单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()A
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B
Configure the network adapter on the test network to disable IEEE 802.1x authentication.C
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB
detailed security device specificationsC
results from pilot network testingD
results from a network audit
考题
单选题You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()A
a list of applications currently in use in the networkB
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC
detailed security device specificationsD
results from pilot network testing
考题
单选题What makes the Cisco End-to-End solution superior to competitor offerings?()A
The Cisco Full-Service network foundation delivers a layered security approach that introduces interoperability issuesB
The Cisco Full-service Network Foundation Increases the support CostC
The Cisco Full-Service Network Foundation delivers a static single layer security approach that eliminates the interoperability issuesD
The Cisco Full-Service Network Foundation Delivers a layered security Approach that eliminates the interoperability issues
考题
多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization
热门标签
最新试卷