更多“What are two security appliances”相关问题
  • 第1题:

    What is the meaning of the word “gadgets” (Paragraph 4)?

    [A] devices [B] tools [C] appliances [D] engines


    正确答案:A

  • 第2题:

    What are two security features of the Cisco Secure Router 500 Series? ()

    • A、Cisco Intrusion Prevention System
    • B、Cisco IOS Software Firewall
    • C、Cisco IOS Easy VPN
    • D、Cisco Unified Wireless Networking
    • E、Cisco ASA Hardware Firewall

    正确答案:A,B

  • 第3题:

    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

    • A、The ability to detect and prevent malicious traffic.
    • B、The ability to associate security breaches with a specific user.
    • C、Converged management of network and security events, network flow data, and identity information.
    • D、Consistent device management across administrative realms.

    正确答案:B,C

  • 第4题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第5题:

    What are two security appliances that can be installed in a network? (Choose two.)()  

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第6题:

    多选题
    What are two security features of the Cisco Secure Router 500 Series? ()
    A

    Cisco Intrusion Prevention System

    B

    Cisco IOS Software Firewall

    C

    Cisco IOS Easy VPN

    D

    Cisco Unified Wireless Networking

    E

    Cisco ASA Hardware Firewall


    正确答案: A,B
    解析: 暂无解析

  • 第7题:

    多选题
    You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()
    A

    Enable BPD guard

    B

    Disable CDP on ports where it is not necessary

    C

    Place unused ports in a common unrouted VLAN

    D

    Prevent automatic trunk configuration

    E

    Implement port security


    正确答案: E,A
    解析: 暂无解析

  • 第8题:

    多选题
    What are two components of the Junos software architecture? ()(Choose two.)
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: D,A
    解析: 暂无解析

  • 第9题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: A,C
    解析: 暂无解析

  • 第10题:

    多选题
    What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
    A

    Smaller companies are at less risk than larger enterprises, so their security needs are not as great.

    B

    Business strategy should directly relate to the security policy and budget.

    C

    The designated security expert should report to the IT department, since that is where thesolution will be implemented.

    D

    Security should be a continuous process.

    E

    Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    What are two security appliances that can be installed in a network (Choose two.)()。
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: A,E
    解析: 暂无解析

  • 第12题:

    单选题
    What is required by regulations concerning the stowage of lifeboats on cargo vessels?()
    A

    Each lifeboat must have a launching appliance

    B

    Launching appliances must be of the gravity type

    C

    There may not be more than two launching appliances on the same deck

    D

    All of the above


    正确答案: C
    解析: 暂无解析

  • 第13题:

    What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()

    • A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
    • B、 Business strategy should directly relate to the security policy and budget.
    • C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.
    • D、 Security should be a continuous process.
    • E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

    正确答案:B,D

  • 第14题:

    What are two reasons that a network administrator would use access lists (Choose two.)()。

    • A、to control vty access into a router
    • B、to control broadcast traffic through a router
    • C、to filter traffic as it passes through a router
    • D、to filter traffic that originates from the router
    • E、to replace passwords as a line of defense against security incursions

    正确答案:A,C

  • 第15题:

    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()

    • A、 intrusion protection
    • B、 identity
    • C、 secure connectivity
    • D、 security management

    正确答案:A,B

  • 第16题:

    The Cisco SA 500 Series Security Appliances are built specifically for businesses with less than 100 employees. What are three important benefits of this device? ()

    • A、 site-to-site VPN for remote offices
    • B、 business-grade firewall
    • C、 Cisco IOS software-based
    • D、 email security
    • E、 XML support
    • F、 premium support via SMARTnet

    正确答案:A,B,D

  • 第17题:

    You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()

    • A、Enable BPD guard
    • B、Disable CDP on ports where it is not necessary
    • C、Place unused ports in a common unrouted VLAN
    • D、Prevent automatic trunk configuration
    • E、Implement port security

    正确答案:C,D

  • 第18题:

    单选题
    Which of these statements regarding Cisco’s WebVPN support is correct?()
    A

     Cisco ISR Routers with the Enhanced Security Bundles support WebVPN.

    B

     Cisco security appliances act as a proxy between the end user and the target web server.

    C

     Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN.

    D

     Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.


    正确答案: D
    解析: 暂无解析

  • 第19题:

    多选题
    What are two components of the JUNOS Software architecture?()
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: C,A
    解析: 暂无解析

  • 第20题:

    多选题
    What are two security appliances that can be installed in a network? ()
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: E,F
    解析: 暂无解析

  • 第21题:

    多选题
    A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()
    A

    The data center would need several devices to achieve its goal.

    B

    Increased usage of standalone devices is cost-effective.

    C

    Using integrated blades would only require two devices.

    D

    Putting all security devices in a single chassis provides a single point of failure.


    正确答案: C,A
    解析: 暂无解析

  • 第22题:

    多选题
    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
    A

    The ability to detect and prevent malicious traffic.

    B

    The ability to associate security breaches with a specific user.

    C

    Converged management of network and security events, network flow data, and identity information.

    D

    Consistent device management across administrative realms.


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    多选题
    The Cisco SA 500 Series Security Appliances are built specifically for businesses with less than 100 employees. What are three important benefits of this device? ()
    A

    site-to-site VPN for remote offices

    B

    business-grade firewall

    C

    Cisco IOS software-based

    D

    email security

    E

    XML support

    F

    premium support via SMARTnet


    正确答案: B,E
    解析: 暂无解析