A. host security
B. perimeter security
C. security monitoring
D. policy management
第1题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
A. intrusion protection
B. identity
C. secure connectivity
D. security management
第2题:
Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()
第3题:
The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()
第4题:
What layer of the TMN (telecommunications management network) model does CTM fit into?()
第5题:
A network vulnerability scanner is part of which critical element of network and system security?()
第6题:
Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()
第7题:
Which of the following is BEST for providing network security?()
第8题:
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()
第9题:
You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster. The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template. You need to implement protective measures against the cluster’s most significant security vulnerability. What should you do? ()
第10题:
Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.
Use packet filtering on all inbound traffic to the cluster.
Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.
Use intrusion detection on the perimeter network.
第11题:
intrusion protection
identity
secure connectivity
security management
第12题:
Optical network
Network management
Storage-area network (SAN)
Content delivery network (CDN)
第13题:
●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.
(75)A.firewall
B.protocol
C.hacker
D.virus
第14题:
Which three roles are predefined in the Cisco UCS system?()
第15题:
In which network element is the IMSI Detach and IMSI Attach information stored? ()
第16题:
Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()
第17题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
第18题:
Which two are needed components when designing and implementing a security solution?()
第19题:
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第20题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第21题:
host security
perimeter security
security monitoring
policy management
第22题:
host security
perimeter security
security monitoring
policy management
第23题:
Optical network
Storage-area network (SAN)
Content delivery network (CDN)
Network management