Network Security is a continuous process. Which three phases apply to this process?()
第1题:
Choose the service component in the optimize phase which assesses the wlan system and drives continuous improvements by recommending remediation measures including device configuration optimization, capacity planning, traffic analysis, security assessment, ()and quality issue resolution.
第2题:
What are three characteristics that buyers of Cisco Small Business routers typically look for?()
第3题:
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()
第4题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第5题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第6题:
Which two are needed components when designing and implementing a security solution?()
第7题:
What is the purpose of a zone in JUNOS Software?()
第8题:
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()
第9题:
host security
perimeter security
security monitoring
policy management
第10题:
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
Configure the network adapter on the test network to disable IEEE 802.1x authentication.
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
第11题:
a list of applications currently in use in the network
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
第12题:
detailed VLAN information
an incident response plan
results of testing the new network configuration
an existing hierarchical network topology
a security policy for your organization
第13题:
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
第14题:
What are the benefit of using Netflow?()
第15题:
How does the Cisco Security Agent proactively stop both known and unknown attacks?()
第16题:
A network vulnerability scanner is part of which critical element of network and system security?()
第17题:
What is an ideal Cisco solution to protect a campus network and services from potential security breaches?()
第18题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第19题:
You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()
第20题:
Configure
Improve
Operate
Monitor
Secure
Troubleshooting
第21题:
It reverse engineers and documents the attack
It looks subjectively at network traffic for abnormal flows of behavior
It creates a signature and updates the network security policies
It actively monitors all vulnerable areas of the network
第22题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第23题:
The Cisco Full-Service network foundation delivers a layered security approach that introduces interoperability issues
The Cisco Full-service Network Foundation Increases the support Cost
The Cisco Full-Service Network Foundation delivers a static single layer security approach that eliminates the interoperability issues
The Cisco Full-Service Network Foundation Delivers a layered security Approach that eliminates the interoperability issues