Without proper safeguards, every part of a network is vulnerable to a security breach or unauthorized activity from ( ), competitors, or even employees. Many of the organizations that manage their own ( ) network security and use the Internet for more than just sending/receiving e-mails experience a network ( )— and more than half of these companies do not even know they were attacked. Smaller ( ) are often complacent, having gained a false sense of security. They usually react to the last virus or the most recent defacing of their website. But they are trapped in a situation where they do not have the necessary time and( )to spend on security.
A.intruders
B.terminals
C.hosts
D.users@@@SXB@@@A.exterior
B.internal
C.centre
D.middle@@@SXB@@@A.attack
B.collapse
C.breakdown
D.virus@@@SXB@@@A.users
B.campuses
C.Companies
D.networks@@@SXB@@@A.safeguards
B.businesses
C.experiences
D.Resources
第1题:
第2题:
第3题:
第4题:
Cisco Clean Access ensures that computers connecting to your network have which of the following?()
第5题:
When a business suffers a security breach, there are be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()
第6题:
When a business suffers a security breach, there can be serious ramifications. What is one of the immediate impacts that the business can suffer because of a security breach?()
第7题:
A network vulnerability scanner is part of which critical element of network and system security?()
第8题:
implemented
implied
impossible
improper
第9题:
It reverse engineers and documents the attack
It looks subjectively at network traffic for abnormal flows of behavior
It creates a signature and updates the network security policies
It actively monitors all vulnerable areas of the network
第10题:
loss of retail sales
loss of customer faith
disruption of business operations
inability to deliver products or services
第11题:
host security
perimeter security
security monitoring
policy management
第12题:
No vulnerable applications or operating systems
No viruses or worms
Appropriate security applications and patch levels
Current IPS signatures
Cisco Security Agent
第13题:
第14题:
第15题:
第16题:
Context-Based Access Control (CBAC) is the algorithm of the Cisco IOS firewall feature. How does CBAC improve Teleworker security?()
第17题:
How does the Cisco Security Agent proactively stop both known and unknown attacks?()
第18题:
Which three practices are important to the implementation of a DiffServ QoS architecture?()
第19题:
What should be part of a comprehensive network security plan?()
第20题:
host security
perimeter security
security monitoring
policy management
第21题:
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
Configure the network adapter on the test network to disable IEEE 802.1x authentication.
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
第22题:
Import Baseline1.inf into the Default Domain Policy Group Policy object (GPO).
Create a task on each application server that runs Security and Configuration Analysis with Baseline1.inf every day.
Create a task on each application server that runs the secedit command with Baseline1.inf every day.
Create a startup script in the Default Domain Policy Group Policy object (GPO) that runs the secedit command with Baseline1.inf.
第23题:
loss of retail sales
loss of customer faith
disruption of business operations
inability to deliver products or services