Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第1题:
A.SNTP
B.SMTP
C.HTTP
D.SNMP
第2题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
第3题:
A company’s wireless network is called FOO and it is not publicly visible. In a wirelessconfiguration wizard, in which of the following locations should the technician put FOO?()
第4题:
Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
第5题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第6题:
An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
第7题:
The warranty expiration date of each server should be recorded in which of the following documents?()
第8题:
All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
第9题:
Network diagram
Performance baseline
Network security procedure
Company policy
第10题:
20 percent of the traffic on a network segment should be local.
no more than 20 percent of the network traffic should be able to move across a backbone.
no more than 80 percent of the network traffic should be able to move across a backbone.
80 percent of the traffic on a network segment should be local.
第11题:
host security
perimeter security
security monitoring
policy management
第12题:
Position
Prepare
Design
Perform
Plan
第13题:
Which of the following statements is true about the 80/20 rule (Select all that apply)?()
第14题:
An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()
第15题:
A network vulnerability scanner is part of which critical element of network and system security?()
第16题:
During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()
第17题:
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
第18题:
Which of the following protocols should be used to monitor network performance?()
第19题:
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()
第20题:
You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain. Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network. How should you configure Server1?()
第21题:
Prepare
Design
Position
Develop
Plan
Perform
第22题:
Default gateway
The ports on the switch
Port security on the server's switch port
Ethernet cable
第23题:
the business knowledge of the IT staff
the technical knowledge of the IT staff
the company’s business objectives
the company’s network topology
the IT future directions