a list of existing network applications currently in use on the network
network audit results to uncover any potential security holes
a planned Layer 2 design solution
a proof-of-concept plan
device configuration templates
第1题:
A.Security increases because only the network administrator may change the routing tables
B.Configuration complexity decreases as network size increases
C.Routing updates are automatically sent to neighbors
D.Route summarization is compued automatically by the router
E.Routing traffic load is reduced when used in stub network links
F.An efficient algorithm is used to build routing tables,using automatic updates
G.Routing tables adapt automatically to topology changes.
第2题:
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
第3题:
A.When uptime is critical
B.When data must be refactored
C.When application concurrency is static
D.When data loss is unacceptable
E.When application is a single point of failure
第4题:
Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()
第5题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第6题:
What are two characteristics of the SDM Security Audit wizard?()
第7题:
Which two actions, when taken in combination, will result in an effective network security solution?()
第8题:
A. When configured for pass-through firewall user authentication, the user must first open a connection to the Junos security remote network resource.
B. When configured for Web firewall user authentication only, the user must first open a connection to the Junos security remote network resource.
C. If a Junos security device is configured for pass-through firewall user authentication, new sessions are automatically intercepted .
D. If a Junos security device is configured for Web firewall user authentication, new sessions are automatically intercepted.
第9题:
Which two statements are true regarding firewall user authentication?() (Choose two.)
第10题:
A network administrator needs to configure port security on a switch.which two statements are true?()