For security reasons a network technician wants to install a Linux based email server, Microsoft web services, and directory services on different servers. Which of the following technologies would be BEST to reduce hard ware costs?()
第1题:
A.IP
B.ICMP
C.TCP
D.UDP
第2题:
What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network in the show ip bgp command output?()
第3题:
What are three characteristics that buyers of Cisco Small Business routers typically look for?()
第4题:
What are the benefit of using Netflow?()
第5题:
A network vulnerability scanner is part of which critical element of network and system security?()
第6题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第7题:
There are many reasons why customers lack sufficient security measures on the network. Which two reasons for insufficient security are typical of the customers today?()
第8题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第9题:
host security
perimeter security
security monitoring
policy management
第10题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第11题:
a list of applications currently in use in the network
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
第12题:
the desire to avoid unnecessary technologies
the belief that free security tools are sufficient
the perceived costs of security solutions
the use of hosted email services eliminating the need for local security
the lack of threats to their network
the lack of risk analysis
第13题:
第14题:
What are the two reasons for the appearance of 0.0.0.0 as the next hop for a network when usingthe "show ip bgp" command?()
第15题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第16题:
How does the Cisco Security Agent proactively stop both known and unknown attacks?()
第17题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第18题:
What are three valid reasons to assign ports to VLANs on a switch? ()
第19题:
Which two are needed components when designing and implementing a security solution?()
第20题:
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()
第21题:
Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
Configure the network adapter on the test network to disable IEEE 802.1x authentication.
Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.
第22题:
to make VTP easier to implement
to isolate broadcast traffic
to increase the size of the collision domain
to allow more devices to connect to the network
to logically group hosts according to function
to increase network security
第23题:
IP
ICMP
TCP
UDP