What are two security appliances that can be installed in a network? ()
第1题:
What is the meaning of the word “gadgets” (Paragraph 4)?
[A] devices [B] tools [C] appliances [D] engines
第2题:
What are two security features of the Cisco Secure Router 500 Series? ()
第3题:
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
第4题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
第5题:
What are two security appliances that can be installed in a network? (Choose two.)()
第6题:
Cisco Intrusion Prevention System
Cisco IOS Software Firewall
Cisco IOS Easy VPN
Cisco Unified Wireless Networking
Cisco ASA Hardware Firewall
第7题:
Enable BPD guard
Disable CDP on ports where it is not necessary
Place unused ports in a common unrouted VLAN
Prevent automatic trunk configuration
Implement port security
第8题:
Linux kernel
routing protocol daemon
session-based forwarding module
separate routing and security planes
第9题:
intrusion protection
identity
secure connectivity
security management
第10题:
Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
Business strategy should directly relate to the security policy and budget.
The designated security expert should report to the IT department, since that is where thesolution will be implemented.
Security should be a continuous process.
Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.
第11题:
ATM
IDS
IOS
IOX
IPS
SDM
第12题:
Each lifeboat must have a launching appliance
Launching appliances must be of the gravity type
There may not be more than two launching appliances on the same deck
All of the above
第13题:
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
第14题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第15题:
The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()
第16题:
The Cisco SA 500 Series Security Appliances are built specifically for businesses with less than 100 employees. What are three important benefits of this device? ()
第17题:
You want to enhance the security within the LAN and prevent VLAN hopping. What two steps can be taken to help prevent this?()
第18题:
Cisco ISR Routers with the Enhanced Security Bundles support WebVPN.
Cisco security appliances act as a proxy between the end user and the target web server.
Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN.
Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.
第19题:
Linux kernel
routing protocol daemon
session-based forwarding module
separate routing and security planes
第20题:
ATM
IDS
IOS
IOX
IPS
SDM
第21题:
The data center would need several devices to achieve its goal.
Increased usage of standalone devices is cost-effective.
Using integrated blades would only require two devices.
Putting all security devices in a single chassis provides a single point of failure.
第22题:
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
第23题:
site-to-site VPN for remote offices
business-grade firewall
Cisco IOS software-based
email security
XML support
premium support via SMARTnet