A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s manage

题目

A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()

  • A、 The data center would need several devices to achieve its goal.
  • B、 Increased usage of standalone devices is cost-effective.
  • C、 Using integrated blades would only require two devices.
  • D、 Putting all security devices in a single chassis provides a single point of failure.

相似考题
参考答案和解析
正确答案:C,D
更多“A security analysis&”相关问题
  • 第1题:

    Which statement describes a security zone?()

    A. A security zone can contain one or more interfaces.

    B. A security zone can contain interfaces in multiple routing instances.

    C. A security zone must contain two or more interfaces.

    D. A security zone must contain bridge groups.


    参考答案:A

  • 第2题:

    ( )is not included in Information Security Risk Assessment Process.

    A.Establishing information security risk criteria
    B.Identifying the information security risks
    C.Formulating an information security risk treatment plan
    D.Analysing the information security risk

    答案:A
    解析:
    信息安全风险评估过程不包括建立信息安全风险准则。

  • 第3题:

    What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()

    • A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
    • B、 Business strategy should directly relate to the security policy and budget.
    • C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.
    • D、 Security should be a continuous process.
    • E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

    正确答案:B,D

  • 第4题:

    Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()

    • A、/etc/security/user
    • B、/etc/security/passwd
    • C、/etc/security/mkuser.sys
    • D、/etc/security/mkuser.default

    正确答案:D

  • 第5题:

    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)

    • A、[edit security idp]
    • B、[edit security zones security-zone trust interfaces ge-0/0/0.0]
    • C、[edit security zones security-zone trust]
    • D、[edit security screen]

    正确答案:B,C

  • 第6题:

    You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()

    • A、Security Templates snap-in 
    • B、Group Policy Management Console 
    • C、Security Configuration and Analysis snap-in 
    • D、Microsoft Baseline Security Analyzer (MBSA)

    正确答案:C

  • 第7题:

    单选题
    Which statement describes a security zone?()
    A

    A security zone can contain one or more interfaces.

    B

    A security zone can contain interfaces in multiple routing instances.

    C

    A security zone must contain two or more interfaces.

    D

    A security zone must contain bridge groups.


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    ()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: B
    解析: 暂无解析

  • 第9题:

    单选题
    ()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.
    A

    Ship security plan

    B

    Company security plan

    C

    Port facility security plan

    D

    National security plan


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    The ship security assessment is an essential and integral part of the process of developing and updating()
    A

    the ship security plan

    B

    the company security plan

    C

    the port security plan

    D

    the national security plan


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    Which operational mode command displays all active IPsec phase 2 security associations?()
    A

    show ike security-associations

    B

    show ipsec security-associations

    C

    show security ike security-associations

    D

    show security ipsec security-associations


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which CLI command provides a summary of what the content-filtering engine has blocked?()
    A

    show security utm content-filtering statistics

    B

    show security flow session

    C

    show security flow statistics

    D

    show security utm content-filtering summary


    正确答案: C
    解析: 暂无解析

  • 第13题:

    ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()

    A./etc/security/limits

    B./etc/security/mkuser.sys

    C./etc/security/priv

    D./etc/security/user


    参考答案:D

  • 第14题:

    Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()

    • A、 Cisco SDM Security Audit
    • B、 Cisco Security MARS
    • C、 Cisco Security Agent MC
    • D、 Cisco Security IntelliShield
    • E、 CAN

    正确答案:A

  • 第15题:

    A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()

    • A、fwtmp < /etc/security/failedlogin
    • B、cat /etc/security/failedlogin
    • C、who
    • D、alog -f /etc/security/failedlogin -o

    正确答案:A

  • 第16题:

    A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()

    • A、/etc/security/limits
    • B、/etc/security/mkuser.sys
    • C、/etc/security/priv
    • D、/etc/security/user

    正确答案:D

  • 第17题:

    You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()

    • A、Use Security Templates to correct the setting and export the security file.
    • B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.
    • C、Use Secedit /RefreshPolicy Machine_Policy command.
    • D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

    正确答案:C

  • 第18题:

    单选题
    ()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    ()shall set security levels and provide guidance for protection from security incidents.
    A

    The Contracting Governments

    B

    The Port Authorities

    C

    The Master

    D

    The Company Security


    正确答案: B
    解析: 暂无解析

  • 第20题:

    单选题
    ()means a plan developed to ensure the application of measures designed to protect the port facility and ships, persons, cargo, cargo transport units and ships stores within the port facility from the risks of a security incident.
    A

    Ship security plan

    B

    Company security plan

    C

    Port facility security plan

    D

    National security plan


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    () means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: D
    解析: 暂无解析

  • 第22题:

    多选题
    At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
    A

    [edit security idp]

    B

    [edit security zones security-zone trust interfaces ge-0/0/0.0]

    C

    [edit security zones security-zone trust]

    D

    [edit security screen]


    正确答案: B,D
    解析: 暂无解析

  • 第23题:

    单选题
    Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()
    A

     Cisco SDM Security Audit

    B

     Cisco Security MARS

    C

     Cisco Security Agent MC

    D

     Cisco Security IntelliShield

    E

     CAN


    正确答案: E
    解析: 暂无解析

  • 第24题:

    单选题
    What does SSO stand for regarding ship security?()
    A

    Ship security office

    B

    Ship security officer

    C

    Ship security operator

    D

    Ship safety office


    正确答案: D
    解析: 暂无解析