Switch1(config-if)# switchport port-security maximum 1
Switch1(config)# mac-address-table secure
Switch1(config)# access-list 10 permit ip host
Switch1(config-if)# switchport p ort-security violation shutdown
Switch1(config-if)# ip access-group 10
第1题:
For the following statements, which one is perceived as a drawback of implementing Fibre ChannelAuthentication Protocol (FCAP)?()
第2题:
You are developing a Windows Communication Foundation (WCF) service. One of the parameters used with the service operations is a security token. The security token is not sensitive. The monitoring software tracks security tokens and can read tokens in clear text only.The company security policy requires that you validate all clear text data passed over the corporate network.You need to ensure that the service verifies that the security token is not changed during transit. What should you do?()
第3题:
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
第4题:
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
第5题:
Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
第6题:
You are designing a Windows Server 2008 R2 Hyper-V virtualization environment. Your host servers must have the following elements: A dedicated management network adapter.A dedicated virtual network for child iSCSI network traffic.A dedicated virtual network for child network traffic with VLAN tagging. You need to choose adapters that minimize the host server processing. Which adapters should you choose?()
第7题:
It provides host-based,two-way network traffic filtering for a computer.
It provides host-based,one-way network traffic filtering for a computer.
It blocks unauthorized network traffic flowing into or out of the local computer.
It only blocks unauthorized network traffic flowing into the local computer.
It only blocks unauthorized network traffic flowing out of the local computer.
第8题:
host security
perimeter security
security monitoring
policy management
第9题:
For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to EncryptAndSign.
Implement IEndpointldentityProvider in the message contract class.
Implement ISecureConversationSession in the message contract class.
For all the security-sensitive members, set the ProtectionLevel parameter of the MessageBodyMember or MessageHeader attribute to Sign.
第10题:
The endpoints can use agentless access.
Encrypted traffic flows between the endpoint and the enforcer.
Encrypted traffic flows between the endpoint and the protected resource
The endpoints can use the Odyssey Access Client.
第11题:
1
2
3
4
第12题:
It is restricted in size to only three segments
It requires the use of netBT as the network protocol
It requires the implementation of IKE
It relies on an underlying Public Key Infrastructure
第13题:
Which OSPF network type is ideal for partially meshed NBMA networks because it is easy to configure(requires no configuration of neighbor commands), consumes only one IP subnet, and requires no designated router election?
第14题:
Which statement describes the behavior of a security policy?()
第15题:
A network vulnerability scanner is part of which critical element of network and system security?()
第16题:
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
第17题:
Network Access Protection (NAP) is configured for the corporate network.Users connect to the corporate network by using portable computers.The company policy requires confidentiality of data when the data is in transit between the portable computers and the servers.You need to ensure that users can access network resources only from computers that comply with the company policy.What should you do?()
第18题:
You are a network administrator of an organization. Maria and John are your network assistant. You have grant then the rights to modify the user properties in the computer management. You want to audit the modification in user accounts. What should you do?()
第19题:
第20题:
Two network adapters that support 802.1p, and one iSCSI host bus adapter
Two network adapters that support 802.1p, and one network adapter that supports TCP Chimney
Two network adapters that support 802.lq, and one network adapter that supports Jumbo frames
Three network adapters that support 802. 1p
第21题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第22题:
Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).
Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.
Create a task on each application server that runs the secedit command with Baseline1.inf every day.
Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.
第23题:
From the Windows Firewall with Advanced Security console, create an inbound rule on Server1.
From the Windows Firewall with Advanced Security console, create an outbound rule on Server1.
From a Group Policy object (GPO), enable the Client (Respond Only) IPSec policy on all client computers.
From a Group Policy object (GPO), configure the Network Security: LDAP client signing requirements policy setting for all client computers.