ATM
IDS
IOS
IOX
IPS
SDM
第1题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
A. intrusion protection
B. identity
C. secure connectivity
D. security management
第2题:
A.ATM
B.IDS
C.IOS
D.IOX
E.IPS
F.SDM
第3题:
A. Linux kernel
B. routing protocol daemon
C. session-based forwarding module
D. separate routing and security planes
第4题:
When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()
第5题:
What are two security appliances that can be installed in a network? ()
第6题:
A.ATM
B.IDS
C.IOS
D.IOX
E.IPS
F.SDM
第7题:
Which of the following is NOT true of security attacks?
[A] Employees will keep up with security polices and awareness if they are highly-trained.
[B] The rate of security attacks appears faster than the growth of the Internet.
[C] One's computer system will never be secure.
[D] Vulnerabilities can go through phones, wireless devices, and network appliances
第8题:
A. A security zone can contain one or more interfaces.
B. A security zone can contain interfaces in multiple routing instances.
C. A security zone must contain two or more interfaces.
D. A security zone must contain bridge groups.
第9题:
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
第10题:
The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()