secure transactions
time to market
maximum uptime
database backups
revenue growth
scalability for future growth
第1题:
The bus had gone when I ____ at the bus stop.
A、have arrived
B、arrived
C、had arrived
D、am arriving
第2题:
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
第3题:
List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()
第4题:
What is an ideal Cisco solution to protect a campus network and services from potential security breaches?()
第5题:
When trying to sell a security solution to an e-commerce business, which three business needs should you address?()
第6题:
An administrator attempts to install the latest security patches for an older server. When the administrator runs the patch installer, the install fails. The administrator tries again, and the installer fails again. Which of the following is the MOST likely reason for this?()
第7题:
develop a policy for securing the network
monitor and test network activities for vulnerabilities
implement reflexive access lists
implement dynamic access lists
select and implement a single comprehensive virus protection program
第8题:
a detailed physical and logical topology
a cost analysis of the implemented solution
detailed logs from the AAA and SNMP servers
results from audit testing of the implemented solution
第9题:
crowd
crowding
crowds
Crowded
第10题:
integrated security
collaborative security system
self provisioning
Adaptive Threat Defense
programmable security ASICs
Cisco lOS-based security
第11题:
Active Directory delegation
Authorization Manager
built-in security groups
user rights assignments
第12题:
detailed VLAN information
an incident response plan
results of testing the new network configuration
an existing hierarchical network topology
a security policy for your organization
第13题:
One solution to major security problems is(71), which are frequently installed to fix known security holes。
A.additions
B.compensations
C.patches
D.complements
第14题:
Which two actions, when taken in combination, will result in an effective network security solution?()
第15题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第16题:
What is needed to verify that a newly implemented security solution is performing as expected? ()
第17题:
Which two are needed components when designing and implementing a security solution?()
第18题:
A solution provider has proposed a pSeries solution to a new customer. The solution is complex with a number of technologies that are new to the customer. They have a tight timeline for implementation. The solution provider has not been able to get a clear understanding as to how the customer will backup the system. What would be the most appropriate action to address the risks with this solution?()
第19题:
secure transactions
time to market
maximum uptime
database backups
revenue growth
scalability for future growth
第20题:
having alternative addressing and VLAN schemes
having a rollback plan in case of unwanted or unexpected results
running a test script against all possible security threats to insure that the solution will mitigate all potential threats
isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
第21题:
The administrator improperly configured the virtual memory settings on the server.
The administrator is using incorrect patch switches for the install.
The administrator is trying to install security patches for software that is not installed.
The administrator is trying to install patches that require hard drive encryption on the server.
第22题:
another name for a firewall deployed in routed mode
another name for a firewall deployed in transparent mode
a separation of multiple firewall security contexts on a single firewall
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
第23题:
another name for a firewall deployed in routed mode
another name for a firewall deployed in transparent mode
a separation of multiple firewall security contexts on a single firewall
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
第24题:
a list of existing network applications currently in use on the network
network audit results to uncover any potential security holes
a planned Layer 2 design solution
a proof-of-concept plan
device configuration templates