niusouti.com

Without proper safeguards, every part of a network is vulnerable to a security breach or unauthorized activity from ( ), competitors, or even employees. Many of the organizations that manage their own ( ) network security and use the Internet for more tha

题目

Without proper safeguards, every part of a network is vulnerable to a security breach or unauthorized activity from ( ), competitors, or even employees. Many of the organizations that manage their own ( ) network security and use the Internet for more than just sending/receiving e-mails experience a network ( )— and more than half of these companies do not even know they were attacked. Smaller ( ) are often complacent, having gained a false sense of security. They usually react to the last virus or the most recent defacing of their website. But they are trapped in a situation where they do not have the necessary time and( )to spend on security.

A.intruders

B.terminals

C.hosts

D.users@@@SXB@@@A.exterior

B.internal

C.centre

D.middle@@@SXB@@@A.attack

B.collapse

C.breakdown

D.virus@@@SXB@@@A.users

B.campuses

C.Companies

D.networks@@@SXB@@@A.safeguards

B.businesses

C.experiences

D.Resources


相似考题
更多“Without proper safeguards, every part of a network is vulnerable to a security breach or u ”相关问题
  • 第1题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.pubic]
    B.private]
    C.personal
    D.proper

    答案:B
    解析:

  • 第2题:

    Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from(71),competitors,or even employees.Many of the organizations that manage their own(72)network security and use the Internet for more than just sending/receiving e-mails experience a network(73)—and more than half of these companies do not even know they were attacked.Smaller(74)are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are trapped in a situation where they do not have the necessary time and(75)to spend on security.

    A.exterior
    B.internal
    C.centre
    D.middle

    答案:B
    解析:

  • 第3题:

    Without proper
    safeguards,every part of a network is vulnerable to a security breach or
    unauthorized activity from( ),competitors,or even employees.Many of
    the organizations that manage their own
    ( )network security and use
    the Internet for more than just sending/receiving e-mails experience a
    network(本题)—and more than half of these companies do
    not even know they were attacked.Smaller
    ( )are often complacent,
    having gained a false sense of security.They usually react to the last virus
    or the most recent defacing of their website.But they are
    trapped in a
    situation where they do not have the necessary time and( )
    to spend on security.

    A.attack
    B.collapse
    C.breakdown
    D.virus

    答案:A
    解析:

  • 第4题:

    Cisco Clean Access ensures that computers connecting to your network have which of the following?()

    • A、 No vulnerable applications or operating systems
    • B、 No viruses or worms
    • C、 Appropriate security applications and patch levels
    • D、 Current IPS signatures
    • E、 Cisco Security Agent

    正确答案:C

  • 第5题:

    When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()

    • A、 loss of retail sales
    • B、 loss of customer faith
    • C、 disruption of business operations
    • D、 inability to deliver products or services

    正确答案:C

  • 第6题:

    When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()

    • A、 loss of retail sales
    • B、 loss of customer faith
    • C、 disruption of business operations
    • D、 inability to deliver products or services

    正确答案:C

  • 第7题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    • A、host security
    • B、perimeter security
    • C、security monitoring
    • D、policy management

    正确答案:C

  • 第8题:

    单选题
    It is an()condition precedent in every voyage charter-party that the ship shall proceed on the voyage without departure from her proper course.
    A

    implemented

    B

    implied

    C

    impossible

    D

    improper


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    How does the Cisco Security Agent proactively stop both known and unknown attacks?()
    A

     It reverse engineers and documents the attack

    B

     It looks subjectively at network traffic for abnormal flows of behavior

    C

     It creates a signature and updates the network security policies

    D

     It actively monitors all vulnerable areas of the network


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()
    A

     loss of retail sales

    B

     loss of customer faith

    C

     disruption of business operations

    D

     inability to deliver products or services


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

    host security

    B

    perimeter security

    C

    security monitoring

    D

    policy management


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Cisco Clean Access ensures that computers connecting to your network have which of the following?()
    A

     No vulnerable applications or operating systems

    B

     No viruses or worms

    C

     Appropriate security applications and patch levels

    D

     Current IPS signatures

    E

     Cisco Security Agent


    正确答案: C
    解析: 暂无解析

  • 第13题:

    IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual ( ) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the (请作答此空) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.

    A.network
    B.transport
    C.application
    D.session

    答案:C
    解析:

  • 第14题:

    Without proper safeguards,every part of a network is vulnerable to a security breach or unauthorized activity from( ),competitors,or even employees.Many of the organizations that manage their own( )network security and use the Internet for more than just sending/receiving e-mails experience a network( )—and more than half of these companies do not even know they were attacked.Smaller( )are often complacent,having gained a false sense of security.They usually react to the last virus or the most recent defacing of their website.But they are
    trapped in a situation where they do not have the necessary time and(本题)to spend on security.

    A.safeguards
    B.businesses
    C.experiences
    D.resources

    答案:D
    解析:

  • 第15题:

    Without proper
    safeguards,every part of a network is vulnerable to a security breach or
    unauthorized activity from(本题),competitors,or even employees.Many of
    the organizations that manage their own
    (72)network security and use
    the Internet for more than just sending/receiving e-mails experience a
    network(73)—and more than half of these companies do
    not even know they were attacked.Smaller
    (74)are often complacent,
    having gained a false sense of security.They usually react to the last virus
    or the most recent defacing of their website.But they are
    trapped in a
    situation where they do not have the necessary time and(75)
    to spend on security.

    A.intruders
    B.terminals
    C.hosts
    D.users

    答案:A
    解析:

  • 第16题:

    Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()

    • A、Inbound packets are permitted only if they are part of a legitimate data flow initiated by a device on the Teleworker home network.
    • B、All packets are checked for integrity by analyzing their checksum.
    • C、Every packet is checked to see if it was sent through the VPN tunnel.
    • D、Every packet is inspected to see if any disallowed URLs are included. URLs are forwarded to the security cache engine for authorization.

    正确答案:A

  • 第17题:

    How does the Cisco Security Agent proactively stop both known and unknown attacks?()

    • A、 It reverse engineers and documents the attack
    • B、 It looks subjectively at network traffic for abnormal flows of behavior
    • C、 It creates a signature and updates the network security policies
    • D、 It actively monitors all vulnerable areas of the network

    正确答案:B

  • 第18题:

    Which three practices are important to the implementation of a DiffServ QoS architecture?()

    • A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.
    • B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.
    • C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.
    • D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.
    • E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.
    • F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.

    正确答案:C,D,F

  • 第19题:

    What should be part of a comprehensive network security plan?()

    • A、Allow users to develop their own approach to network security.
    • B、Physically secure network equipment from potential access by unauthorized individuals.
    • C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
    • D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
    • E、Minimize network overhead by deactivating automatic antivirus client updates.

    正确答案:B

  • 第20题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()
    A

     Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.

    B

     Configure the network adapter on the test network to disable IEEE 802.1x authentication.

    C

     Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.

    D

     Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.

    E

     Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    单选题
    You are the network administrator for your company. The network consists of a single Active Directory domain. The company has an internal network and a perimeter network. The internal network is protected by a firewall. Application servers on the perimeter network are accessible from the Internet.   You are deploying 10 Windows Server 2003 computers in application server roles. The servers will be located in theperimeter network and will not be members of the domain. The servers will host only publicly available Web pages.  The network design requires that custom security settings must be applied to the application servers. These custom security settings must be automatically refreshed every day to ensure compliance with the design.   You create a custom security template named Baseline1.inf for the application servers. You need to comply with the design requirements.   What should you do?  ()
    A

     Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).

    B

     Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.

    C

     Create a task on each application server that runs the secedit command with Baseline1.inf every day.

    D

     Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.


    正确答案: C
    解析: 暂无解析

  • 第23题:

    单选题
    When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()
    A

     loss of retail sales

    B

     loss of customer faith

    C

     disruption of business operations

    D

     inability to deliver products or services


    正确答案: A
    解析: 暂无解析