网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A network vulnerability scanner is part of which critical element of network and system security?()
A. host security
B. perimeter security
C. security monitoring
D. policy management
参考答案
更多 “ A network vulnerability scanner is part of which critical element of network and system security?() A. host securityB. perimeter securityC. security monitoringD. policy management ” 相关考题
考题
The broadcaster is part of a complex network of()
A、distributorsB、content creatorsC、advertisersD、cable system
考题
The purpose of a network( )is to provide a shell around the network which will protect the system connected to the network from various threats.A.firewallB.switchC.routerD.gateway
考题
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A. Verity full system functionalityB. Identify the main problem and question the userC. Document their findings, actions, and outcomesD. Escalate the issue to upper management
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS
考题
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management
考题
●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus
考题
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()A、Content networkingB、Campus local-area networkingC、Network managementD、Network security
考题
Which three roles are predefined in the Cisco UCS system?()A、Server AdminB、Network AdminC、Storage AdminD、Security Admin
考题
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A、Verity full system functionalityB、Identify the main problem and question the userC、Document their findings, actions, and outcomesD、Escalate the issue to upper management
考题
In which network element is the IMSI Detach and IMSI Attach information stored? ()A、BSCB、HLRC、MSC/VLR
考题
What layer of the TMN (telecommunications management network) model does CTM fit into?()A、Network management layerB、Element management layerC、Business management layerD、Network element layer
考题
Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Storage-area network (SAN)C、Content delivery network (CDN)D、Network management
考题
A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management
考题
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management
考题
Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Network managementC、Storage-area network (SAN)D、Content delivery network (CDN)
考题
Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization
考题
Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS
考题
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy
考题
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
考题
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS
考题
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()A
Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B
Use packet filtering on all inbound traffic to the cluster.C
Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D
Use intrusion detection on the perimeter network.
考题
单选题A network vulnerability scanner is part of which critical element of network and system security?()A
host securityB
perimeter securityC
security monitoringD
policy management
考题
多选题The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()Aintrusion protectionBidentityCsecure connectivityDsecurity management
考题
单选题Which network technology addresses these customer business needs: shrinking budgets and ITstaffs, more complex networks, and an increased need for network security?()A
Optical networkB
Storage-area network (SAN)C
Content delivery network (CDN)D
Network management
考题
单选题Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A
Optical networkB
Network managementC
Storage-area network (SAN)D
Content delivery network (CDN)
热门标签
最新试卷