网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
How does the Cisco Security Agent proactively stop both known and unknown attacks?()
- A、 It reverse engineers and documents the attack
- B、 It looks subjectively at network traffic for abnormal flows of behavior
- C、 It creates a signature and updates the network security policies
- D、 It actively monitors all vulnerable areas of the network
参考答案
更多 “How does the Cisco Security Agent proactively stop both known and unknown attacks?()A、 It reverse engineers and documents the attackB、 It looks subjectively at network traffic for abnormal flows of behaviorC、 It creates a signature and updates the network security policiesD、 It actively monitors all vulnerable areas of the network” 相关考题
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
What should be part of a comprehensive network security plan()。
A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE.Minimize network overhead by deactivating automatic antivirus client updates
考题
Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent
考题
What is an important step to take when verifying a newly proposed network security solution? ()A、Test the design on a pilot network for expected results prior to implementing on the production network.B、Run a network audit to determine types of traffic in use on the network.C、Launch campus updates into the production network and monitor impact to see if configuration changes are needed.D、Create an interruption of data flow to determine test "back-door" access methods.
考题
What makes the Cisco End-to-End solution superior to competitor offerings?()A、The Cisco Full-Service network foundation delivers a layered security approach that introduces interoperability issuesB、The Cisco Full-service Network Foundation Increases the support CostC、The Cisco Full-Service Network Foundation delivers a static single layer security approach that eliminates the interoperability issuesD、The Cisco Full-Service Network Foundation Delivers a layered security Approach that eliminates the interoperability issues
考题
The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to router) basis?()A、nGenius Real-Time MonitorB、Cisco ViewC、Device Fault ManagerD、Internetwork Performance Monitor
考题
What Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX?()A、Configuration interceptorB、Network interceptorC、File system interceptorD、Execution space interceptor
考题
Which statement is true about the Cisco Self-Defending Network?()A、The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB、The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC、The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD、The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation
考题
What should be part of a comprehensive network security plan()。A、Allow users to develop their own approach to network securityB、Physically secure network equipment from potential access by unauthorized individualsC、Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE、Minimize network overhead by deactivating automatic antivirus client updates
考题
The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A、nGenius Real-Time MonitorB、CiscoViewC、Device Fault ManagerD、Internetwork Performance Monitor
考题
Which of the following is the advantage of Server to Server replication in a cluster environment over Disk to Disk?()A、Reduced network trafficB、Frequent BIOS updates are not requiredC、Backup agent does not need to be installedD、Provides greater overall fault tolerance
考题
Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A、 Cisco Secure Desktop (CSD)B、 NAC Appliance Agent (NAA)C、 Cisco SecurityAgent (CSA)D、 SSLVPN Client (SVC)E、 Cisco TrustAgent (CTA)
考题
How can mobile devices and wireless networks be secured?()A、 by securely deploying new applications with appropriate performance levelsB、 by providing security that is based on a multilayer,system-level approachC、 by looking subjectively at network traffic for abnormal flowsD、 by requiring a host-based hardware application
考题
Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A、 Cisco Trust AgentB、 Cisco Self-Defending NetworkC、 Cisco Secure Access ControlD、 Cisco Network Admission Control
考题
From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()A、 extends networkQoS throughout the networkB、 simplifies management of central or remotely locates access pointsC、 ensures implementation of the most recent security protocolsD、 streamlines wireless LAN managementE、 extends features for optical traffic network services
考题
Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".
考题
What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()A、 Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B、 Configure the network adapter on the test network to disable IEEE 802.1x authentication.C、 Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D、 Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E、 Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
考题
单选题Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A
Cisco Trust AgentB
Cisco Self-Defending NetworkC
Cisco Secure Access ControlD
Cisco Network Admission Control
考题
单选题Which statement is true about the Cisco Self-Defending Network?()A
The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB
The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC
The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD
The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation
考题
单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()A
No vulnerable applications or operating systemsB
No viruses or wormsC
Appropriate security applications and patch levelsD
Current IPS signaturesE
Cisco Security Agent
考题
单选题Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A
Cisco Secure Desktop (CSD)B
NAC Appliance Agent (NAA)C
Cisco SecurityAgent (CSA)D
SSLVPN Client (SVC)E
Cisco TrustAgent (CTA)
考题
多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.
考题
单选题How does the Cisco Security Agent proactively stop both known and unknown attacks?()A
It reverse engineers and documents the attackB
It looks subjectively at network traffic for abnormal flows of behaviorC
It creates a signature and updates the network security policiesD
It actively monitors all vulnerable areas of the network
考题
多选题From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()Aextends networkQoS throughout the networkBsimplifies management of central or remotely locates access pointsCensures implementation of the most recent security protocolsDstreamlines wireless LAN managementEextends features for optical traffic network services
考题
单选题How can mobile devices and wireless networks be secured?()A
by securely deploying new applications with appropriate performance levelsB
by providing security that is based on a multilayer,system-level approachC
by looking subjectively at network traffic for abnormal flowsD
by requiring a host-based hardware application
热门标签
最新试卷