niusouti.com
参考答案和解析
参考答案:A, C, D
更多“What are three primary activities in the cycle of building an enterprise security strategy?() ”相关问题
  • 第1题:

    What are the three main forms of word building in English?
    Affixation, compounding and conversion.

  • 第2题:

    What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()

    • A、AlarmSeverity
    • B、AlarmKeepalive
    • C、AlarmTraits
    • D、EventMedia
    • E、EventAlarm
    • F、EventAction

    正确答案:A,C,F

  • 第3题:

    What are the three main types of networks that must be considered when defining a security policy?


    正确答案:Trusted, untrusted, unknown.

  • 第4题:

    List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()

    • A、 integrated security
    • B、 collaborative security system
    • C、 self provisioning
    • D、 Adaptive Threat Defense
    • E、 programmable security ASICs
    • F、 Cisco lOS-based security

    正确答案:A,B,D

  • 第5题:

    What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()

    • A、 using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks
    • B、 automatic reconfiguration s of the security devices based on current security threats
    • C、 containment and control of security threats
    • D、 application security
    • E、 anti-x defense F- virtual firewall

    正确答案:C,D,E

  • 第6题:

    What are three primary activities in the cycle of building an enterprise security strategy?()

    • A、activity audit
    • B、administration
    • C、policy establishment
    • D、technology implementation

    正确答案:A,C,D

  • 第7题:

    You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()

    • A、Basic authentication and connection security rules
    • B、Basic authentication and SSL
    • C、Digest authentication and connection security rules
    • D、Digest authentication and SSL

    正确答案:B

  • 第8题:

    问答题
    What are the three main types of networks that must be considered when defining a security policy?

    正确答案: Trusted, untrusted, unknown.
    解析: 暂无解析

  • 第9题:

    多选题
    What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()
    A

    AlarmSeverity

    B

    AlarmKeepalive

    C

    AlarmTraits

    D

    EventMedia

    E

    EventAlarm

    F

    EventAction


    正确答案: E,B
    解析: 暂无解析

  • 第10题:

    多选题
    List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()
    A

    integrated security

    B

    collaborative security system

    C

    self provisioning

    D

    Adaptive Threat Defense

    E

    programmable security ASICs

    F

    Cisco lOS-based security


    正确答案: C,B
    解析: 暂无解析

  • 第11题:

    单选题
    In speaking activities, a speaker often tries to avoid using a difficult word or structure and chooses to use a simpler one. What learning strategy does the speaker use?
    A

    Simplification.

    B

    Generalization.

    C

    Paraphrase.

    D

    Avoidance.


    正确答案: A
    解析:

  • 第12题:

    多选题
    What are three characteristics that buyers of Cisco Small Business routers typically look for?()
    A

    basic security options

    B

    simple network configuration

    C

    advanced network configuration

    D

    integrated solutions

    E

    advanced security options

    F

    point products


    正确答案: D,E
    解析: 暂无解析

  • 第13题:

    What is a primary objective of the security architecture assessment? ()

    • A、document power and UPS availability
    • B、to integrate routing and switching components
    • C、create a design specification document
    • D、document the customer's current and future technology projects

    正确答案:B

  • 第14题:

    What is one benefit of the Cisco anti-X defense strategy?()

    • A、 applications security
    • B、 virtual firewall protection
    • C、 security events correlation for proactive response
    • D、 malware, virus, and worm mitigation

    正确答案:D

  • 第15题:

    What are three characteristics that buyers of Cisco Small Business routers typically look for?()

    • A、 basic security options
    • B、 simple network configuration
    • C、 advanced network configuration
    • D、 integrated solutions
    • E、 advanced security options
    • F、 point products

    正确答案:B,E,F

  • 第16题:

    What are three important security issues in any small, medium, or enterprise business organization? ()

    • A、 rapid response time
    • B、 head count
    • C、 connectivity
    • D、 security threats
    • E、 reduced complexity
    • F、 disaster recovery

    正确答案:A,D,F

  • 第17题:

    Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()

    • A、 Cisco Trust Agent
    • B、 Cisco Self-Defending Network
    • C、 Cisco Secure Access Control
    • D、 Cisco Network Admission Control

    正确答案:B

  • 第18题:

    What are three methods for managing a Juniper Enterprise Router?()

    • A、CU
    • B、SDX
    • C、SAP
    • D、J-Web
    • E、J-Config

    正确答案:A,B,D

  • 第19题:

    多选题
    What are three methods for managing a Juniper Enterprise Router?()
    A

    CU

    B

    SDX

    C

    SAP

    D

    J-Web

    E

    J-Config


    正确答案: C,B
    解析: 暂无解析

  • 第20题:

    多选题
    What are three benefits of the Cisco Adaptive Threat Defense strategy? (Choose three.) ()
    A

    using QoS techniques such as Traffic Policing to rate limit suspected traffic to prevent DoS attacks

    B

    automatic reconfiguration s of the security devices based on current security threats

    C

    containment and control of security threats

    D

    application security

    E

    anti-x defense F- virtual firewall


    正确答案: B,E
    解析: 暂无解析

  • 第21题:

    问答题
    What are the three main forms of word building in English?

    正确答案: Affixation, compounding and conversion.
    解析: 暂无解析

  • 第22题:

    多选题
    What are three important security issues in any small, medium, or enterprise business organization? ()
    A

    rapid response time

    B

    head count

    C

    connectivity

    D

    security threats

    E

    reduced complexity

    F

    disaster recovery


    正确答案: B,E
    解析: 暂无解析

  • 第23题:

    单选题
    What is one benefit of the Cisco anti-X defense strategy?()
    A

     applications security

    B

     virtual firewall protection

    C

     security events correlation for proactive response

    D

     malware, virus, and worm mitigation


    正确答案: A
    解析: 暂无解析