When creating a network security solution, which two pieces 

题目
多选题
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
A

a list of existing network applications currently in use on the network

B

network audit results to uncover any potential security holes

C

a planned Layer 2 design solution

D

a proof-of-concept plan

E

device configuration templates

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Which two are advantages of static routing when compared to dynamic routing?()

A.Security increases because only the network administrator may change the routing tables

B.Configuration complexity decreases as network size increases

C.Routing updates are automatically sent to neighbors

D.Route summarization is compued automatically by the router

E.Routing traffic load is reduced when used in stub network links

F.An efficient algorithm is used to build routing tables,using automatic updates

G.Routing tables adapt automatically to topology changes.


参考答案:A, E

第2题:

When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()

  • A、a list of existing network applications currently in use on the network
  • B、network audit results to uncover any potential security holes
  • C、a planned Layer 2 design solution
  • D、a proof-of-concept plan
  • E、device configuration templates

正确答案:A,B

第3题:

Which two requirements would lead towards a high availability solution?()

A.When uptime is critical

B.When data must be refactored

C.When application concurrency is static

D.When data loss is unacceptable

E.When application is a single point of failure


参考答案:A, D

第4题:

Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()

  • A、 CiscoWorks Security Device Management Center (SD/MC)
  • B、 Security Device Manager (SDM)
  • C、 Adaptive Security Device Manager (ASDM)
  • D、 CiscoWorks VMS/Management Center (VMS/MC)

正确答案:D

第5题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

第6题:

What are two characteristics of the SDM Security Audit wizard?()

  • A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement
  • B、has two modes of operationinteractive and non-interactive
  • C、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router
  • D、uses interactive dialogs and prompts to implement role-based CLI
  • E、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

正确答案:A,E

第7题:

Which two actions, when taken in combination, will result in an effective network security solution?()

  • A、 develop a policy for securing the network
  • B、 monitor and test network activities for vulnerabilities
  • C、 implement reflexive access lists
  • D、 implement dynamic access lists
  • E、 select and implement a single comprehensive virus protection program

正确答案:A,B

第8题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.

B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.

C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .

D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.


参考答案:B, C

第9题:

Which two statements are true regarding firewall user authentication?() (Choose two.)

  • A、When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
  • B、When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
  • C、If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
  • D、If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.

正确答案:B,C

第10题:

A network administrator needs to configure port security on a switch.which two statements are true?()

  • A、The network administrator can apply port security to dynamic access ports
  • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
  • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
  • D、The network administrator can apply port security to EtherChannels.
  • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

正确答案:C,E

更多相关问题