authorization
data integrity
confidentiality
authentication
第1题:
A.2 through 1001
B.1 through 1001
C.1 through 1002
D.2 through 1005
第2题:
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()
第3题:
A. A security zone can contain one or more interfaces.
B. A security zone can contain interfaces in multiple routing instances.
C. A security zone must contain two or more interfaces.
D. A security zone must contain bridge groups.
第4题:
Which two protocols can have their headers compressed through MQC?()
第5题:
Which security mechanism is employed only on the server-side to limit access to resources or components?()
第6题:
Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances
第7题:
Which two statements about the Wired Equivalent Privacy (WEP) encryption mechanism are true? ()
第8题:
A. Network Intrusion
B. Adware Popups
C. Social Engineering
D. Spam Messages
第9题:
assuming the default switch configuration which vlan range can be added modified and removed on a cisco switch?()
第10题:
Which QoS mechanism can help classify different kinds of Citrix traffic print job versus real-time terminalcontrol?()