niusouti.com
更多“A network vulnerability scanner is part of which critical element of network and system security?() ”相关问题
  • 第1题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    A. intrusion protection

    B. identity

    C. secure connectivity

    D. security management


    参考答案:B, D

  • 第2题:

    Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()

    • A、Content networking
    • B、Campus local-area networking
    • C、Network management
    • D、Network security

    正确答案:C

  • 第3题:

    The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()

    • A、Verity full system functionality
    • B、Identify the main problem and question the user
    • C、Document their findings, actions, and outcomes
    • D、Escalate the issue to upper management

    正确答案:A

  • 第4题:

    What layer of the TMN (telecommunications management network) model does CTM fit into?()

    • A、Network management layer
    • B、Element management layer
    • C、Business management layer
    • D、Network element layer

    正确答案:B

  • 第5题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    • A、host security
    • B、perimeter security
    • C、security monitoring
    • D、policy management

    正确答案:C

  • 第6题:

    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()

    • A、Optical network
    • B、Network management
    • C、Storage-area network (SAN)
    • D、Content delivery network (CDN)

    正确答案:B

  • 第7题:

    Which of the following is BEST for providing network security?()

    • A、Firewall
    • B、DMZ
    • C、Switch
    • D、IDS

    正确答案:A

  • 第8题:

    Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()

    • A、Network management
    • B、Protocol analyzer
    • C、Network monitoring
    • D、System diagnostic

    正确答案:A

  • 第9题:

    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()

    • A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
    • B、 Use packet filtering on all inbound traffic to the cluster.
    • C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
    • D、 Use intrusion detection on the perimeter network.

    正确答案:B

  • 第10题:

    单选题
    You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()
    A

     Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.

    B

     Use packet filtering on all inbound traffic to the cluster.

    C

     Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.

    D

     Use intrusion detection on the perimeter network.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: A,C
    解析: 暂无解析

  • 第12题:

    单选题
    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()
    A

    Optical network

    B

    Network management

    C

    Storage-area network (SAN)

    D

    Content delivery network (CDN)


    正确答案: D
    解析: 暂无解析

  • 第13题:

    ●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.

    (75)A.firewall

    B.protocol

    C.hacker

    D.virus


    正确答案:A

  • 第14题:

    Which three roles are predefined in the Cisco UCS system?()

    • A、Server Admin
    • B、Network Admin
    • C、Storage Admin
    • D、Security Admin

    正确答案:A,B,C

  • 第15题:

    In which network element is the IMSI Detach and IMSI Attach information stored? ()

    • A、BSC
    • B、HLR
    • C、MSC/VLR

    正确答案:C

  • 第16题:

    Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()

    • A、Optical network
    • B、Storage-area network (SAN)
    • C、Content delivery network (CDN)
    • D、Network management

    正确答案:D

  • 第17题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第18题:

    Which two are needed components when designing and implementing a security solution?()

    • A、detailed VLAN information
    • B、an incident response plan
    • C、results of testing the new network configuration
    • D、an existing hierarchical network topology
    • E、a security policy for your organization

    正确答案:B,E

  • 第19题:

    Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()

    • A、Network diagram
    • B、Performance baseline
    • C、Network security procedure
    • D、Company policy

    正确答案:A

  • 第20题:

    Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()

    • A、Honeynet
    • B、Honeypot
    • C、Vulnerability scanner
    • D、Network based IDS

    正确答案:A

  • 第21题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

    host security

    B

    perimeter security

    C

    security monitoring

    D

    policy management


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    Which network technology addresses these customer business needs: shrinking budgets and ITstaffs, more complex networks, and an increased need for network security?()
    A

    Optical network

    B

    Storage-area network (SAN)

    C

    Content delivery network (CDN)

    D

    Network management


    正确答案: B
    解析: 暂无解析