考题
NAC's(Network Access Control)role is to restrict network access to only compliant endpoints and(66)users. However, NAC is not a complete LAN(67)solution; additional proactive and(68)security measures must be implemented. Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security(69). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures — real-time, multilevel(70)inspection and microsecond threat containment.A.automatedB.distinguishedC.authenticatedD.destructed
考题
A network vulnerability scanner is part of which critical element of network and system security?()
A. host securityB. perimeter securityC. security monitoringD. policy management
考题
A refusal to work part of the day only may ______ to be a strike even though such refusal is not in breach of contract.A.holdB.be heldC.be maintainedD.be reported
考题
NAC's (Network Access Control) role is to restrict network access to only compliant endpoints and (请作答此空)users. However, NAC is not a complete LAN( )solution; additional proactive and ( )security measures must be implemented, Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security( ). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures—real-time, multilevel( )inspection and microsecond threat containment.A.automated]
B.distinguished]
C.authenticated]
D.destructed]
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic]
B.private]
C.personal
D.proper
考题
IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.
A.network
B.transport
C.application
D.session
考题
Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.
A.exterior
B.internal
C.centre
D.middle
考题
Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from( ),competitors,or even employees.Many of the organizations that manage their own( )network security and use the Internet for more than just sending/receiving e-mails experience a network( )—and more than half of these companies do not even know they were attacked.Smaller( )are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are
trapped in a situation where they do not have the necessary time and(本题)to spend on security.A.safeguards
B.businesses
C.experiences
D.resources
考题
Without proper
safeguards,every part of a network is vulnerable to a security breach or
unauthorized activity from( ),competitors,or even employees.Many of
the organizations that manage their own
( )network security and use
the Internet for more than just sending/receiving e-mails experience a
network(本题)—and more than half of these companies do
not even know they were attacked.Smaller
( )are often complacent,
having gained a false sense of security.They usually react to the last virus
or the most recent defacing of their website.But they are
trapped in a
situation where they do not have the necessary time and( )
to spend on security.A.attack
B.collapse
C.breakdown
D.virus
考题
Without proper
safeguards,every part of a network is vulnerable to a security breach or
unauthorized activity from(本题),competitors,or even employees.Many of
the organizations that manage their own
(72)network security and use
the Internet for more than just sending/receiving e-mails experience a
network(73)—and more than half of these companies do
not even know they were attacked.Smaller
(74)are often complacent,
having gained a false sense of security.They usually react to the last virus
or the most recent defacing of their website.But they are
trapped in a
situation where they do not have the necessary time and(75)
to spend on security.A.intruders
B.terminals
C.hosts
D.users
考题
Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent
考题
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()A、Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.B、All packets are checked for integrity by analyzing their checksum.C、Every packet is checked to see if it was sent through the VPN tunnel.D、Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.
考题
When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A、 loss of retail salesB、 loss of customer faithC、 disruption of business operationsD、 inability to deliver products or services
考题
How does the Cisco Security Agent proactively stop both known and unknown attacks?()A、 It reverse engineers and documents the attackB、 It looks subjectively at network traffic for abnormal flows of behaviorC、 It creates a signature and updates the network security policiesD、 It actively monitors all vulnerable areas of the network
考题
When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A、 loss of retail salesB、 loss of customer faithC、 disruption of business operationsD、 inability to deliver products or services
考题
Which three practices are important to the implementation of a DiffServ QoS architecture?()A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.
考题
单选题It is an()condition precedent in every voyage charter-party that the ship shall proceed on the voyage without departure from her proper course.A
implementedB
impliedC
impossibleD
improper
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题How does the Cisco Security Agent proactively stop both known and unknown attacks?()A
It reverse engineers and documents the attackB
It looks subjectively at network traffic for abnormal flows of behaviorC
It creates a signature and updates the network security policiesD
It actively monitors all vulnerable areas of the network
考题
单选题You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()A
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B
Configure the network adapter on the test network to disable IEEE 802.1x authentication.C
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
考题
单选题When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A
loss of retail salesB
loss of customer faithC
disruption of business operationsD
inability to deliver products or services
考题
单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an internal network and a perimeter network. The internal network is protected by a firewall. Application servers on the perimeter network are accessible from the Internet. You are deploying 10 Windows Server 2003 computers in application server roles. The servers will be located in theperimeter network and will not be members of the domain. The servers will host only publicly available Web pages. The network design requires that custom security settings must be applied to the application servers. These custom security settings must be automatically refreshed every day to ensure compliance with the design. You create a custom security template named Baseline1.inf for the application servers. You need to comply with the design requirements. What should you do? ()A
Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).B
Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.C
Create a task on each application server that runs the secedit command with Baseline1.inf every day.D
Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()A
loss of retail salesB
loss of customer faithC
disruption of business operationsD
inability to deliver products or services
考题
单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()A
No vulnerable applications or operating systemsB
No viruses or wormsC
Appropriate security applications and patch levelsD
Current IPS signaturesE
Cisco Security Agent