niusouti.com

Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()A、 Advanced Correlation EngineB、 Advanced Notification EngineC、 CiscoWorks DashboardD、 Management Center for CSA

题目

Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()

  • A、 Advanced Correlation Engine
  • B、 Advanced Notification Engine
  • C、 CiscoWorks Dashboard
  • D、 Management Center for CSA

相似考题
更多“Which VMS Security&#”相关问题
  • 第1题:

    An administrator named Admin1 plans to deploy the planned VMs. You need to identify which servers can be converted to VMs by using physical-to-virtual machine (P2V) conversion. Which server or servers should you identify?()

    • A、Humongous2
    • B、Humongous4
    • C、Humongous3
    • D、Humongous1

    正确答案:A

  • 第2题:

    Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You are planning to install an application upgrade. Testing the production application requires access to the following three virtual machines (VMs): a domain controller, a server that runs Microsoft SQL Server, and an IIS Web server. You need to test the application upgrade in a virtual environment that is isolated from the production network. Which two sets of actions should your plan include?()

    • A、Import the checkpoint into the test environment, and apply the application update for testing
    • B、Create a checkpoint of the three VMs, and export the checkpoint to the test environment
    • C、Create three VMs in the test environment, attach the existing .vhd files, and apply the application update for testing
    • D、Pause the three VMs, and copy the .vhd files to the test environment

    正确答案:A,B

  • 第3题:

    Your network includes Windows Server 2008 R2 Hyper-V servers. You are configuring the servers in a failover cluster that will host highly available virtual machines (HAVMs).  You plan to manage the servers in the cluster by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to design a storage solution for the cluster that allows you to migrate virtual machines (VMs) into and out of the cluster by using SAN migration.  Which two actions should you include in your design?()

    • A、Enable the automount feature on each node in the cluster
    • B、Install a Virtual Disk Service (VDS) hardware provider on each node in the cluster
    • C、Place all VMs on a single Cluster Shared Volume (CSV)
    • D、Place all VMs on a dedicated logical unit number (LUN)

    正确答案:B,D

  • 第4题:

    多选题
    关于U1900系列内置VMS的说法,正确的是()。
    A

    U1910/U1930内置VMS、内置存储

    B

    U1910/U1930内置VMS、外置存储

    C

    U1960内置VMS、内置存储

    D

    U1960内置VMS、外置存储


    正确答案: C,A
    解析: 暂无解析

  • 第5题:

    单选题
    Which VMS Security Monitor tool allows you to monitor data for patterns of attacks from onemachine to a list of targets?  ()
    A

     Advanced Correlation Engine

    B

     Advanced Notification Engine

    C

     CiscoWorks Dashboard

    D

     Management Center for CSA


    正确答案: D
    解析: 暂无解析

  • 第6题:

    单选题
    The servers on your network run Windows Server 2008 R2. You are planning a two-node Hyper-V failover cluster with SAN storage, and 16 virtual machines (VMs).  You plan to use quick migration. You need to place the maximum number of VMs on each logical unit number (LUN). You need to ensure that you can move individual VMs between cluster nodes without affecting other VMs.  How many VMs should you place on each LUN?()
    A

    one

    B

    two

    C

    four

    D

    eight


    正确答案: A
    解析: 暂无解析

  • 第7题:

    单选题
    Which Cisco product is a hardware component that supports content filtering and other gateway security functions for the Catalyst 6500 Series?()
    A

    Cisco Firewall Services Module (FWSM)

    B

    Cisco Private Internet Exchange (PIX) Firewall

    C

    Cisco VPN/Security Management Solution (VMS)

    D

    Cisco Internetwork Operating System (IOS) Firewall


    正确答案: C
    解析: 暂无解析

  • 第8题:

    All client computers in your company run Windows 7. Windows Virtual PC is installed on all client computers. You create and configure a virtual machine (VM) named Guest1. You need to use the Guest1 virtual hard disk (VHD) as a base for additional VMs that will run on the same host computer, and minimize the disk space required for each ne w VM. Which type of VHD should you create for the new VMs?()

    • A、fixed size
    • B、differencing
    • C、dynamically expanding
    • D、linked to a physical hard disk

    正确答案:B

  • 第9题:

    You use Hyper-V Server 2008 R2 and failover clustering to host several virtual machines (VMs). You need to place a disk in maintenance mode. Which Windows PowerShell cmdlet should you run?()

    • A、Block- ClusterAccess
    • B、Stop- ClusterResource
    • C、Suspend- ClusterResource
    • D、Set- ClusterResourceDependency

    正确答案:C

  • 第10题:

    单选题
    Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()
    A

     CiscoWorks Security Device Management Center (SD/MC)

    B

     Security Device Manager (SDM)

    C

     Adaptive Security Device Manager (ASDM)

    D

     CiscoWorks VMS/Management Center (VMS/MC)


    正确答案: B
    解析: 暂无解析

  • 第11题:

    多选题
    Your network contains a Hyper-V host named Host1 that runs Windows Server 2008 R2. The host is connected to VLAN ID 10. For testing purposes, you plan to deploy several virtual machines (VMs) on the Host1. You need to recommend which virtual networks must be created for the VMs. The solution must ensure that the VMs can only connect to other VMs. Which network configuration or configurations should you recommend?()
    A

    an external network on VLAN ID 10

    B

    an internal network on VLAN ID 11

    C

    an external network on VLAN ID 11

    D

    a private network on VLAN ID 10

    E

    an internal network on VLAN ID 10


    正确答案: C,D
    解析: 暂无解析

  • 第12题:

    单选题
    You are evaluating whether to deploy Hyper-V.Which technical requirement is NOT met by a Hyper-V deployment?()
    A

    Allocate CPU resources between VMs.

    B

    Simplify the management of all hardware.

    C

    Ensure that the VMs can connect to multiple VLANs.

    D

    Minimize the amount of administrative effort required to convert physical servers to VMs.


    正确答案: B
    解析: 暂无解析

  • 第13题:

    多选题
    You plan to implement Hyper-V Virtualization to test applications. In the test environment, you will take frequent snapshots of virtual machines (VMs). You need to recommend which disk types you should use for the planned deployment of the VMs.   Which disk types should you recommend?()
    A

    fixed-size

    B

    dynamically expanding

    C

    pass-through

    D

    differencing


    正确答案: A,B
    解析: 暂无解析