IDS
IPS
Firewall
Managed PKI
第1题:
The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()
A. another name for a firewall deployed in routed mode
B. another name for a firewall deployed in transparent mode
C. a separation of multiple firewall security contexts on a single firewall
D. a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
第2题:
The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()
第3题:
You need to recommend which role services must be deployed to support the company’s planned changes. Which two role services should you recommend?()
第4题:
A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()
第5题:
An administrator wants to test the network MTU. Which of the following commands allows differentsize packets to be sent?()
第6题:
An administrator wants to proactively collect information on attackers and their attempted methods of gaining access to the internal network. Which of the following would allow the administrator to do this?()
第7题:
You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.The Company.com employees use Outlook Web App to have access to their e-mail.A new Company.com policy prohibits the employees from downloading ZIP files from Outlook Web App.The CIO wants the employees to use Microsoft Office Outlook to download ZIP files.What should you do?()
第8题:
Local workstations
Backup tapes
Domain controllers
Email server
SMTP gateway
Proxy server
第9题:
You must set up an IP Block list.
You must set up sender filtering.
You must set up managed folders.
You must build a transport rule
第10题:
NIPS
Honeypot
DMZ
NIDS
第11题:
Run the net view command.
Run the gpresult command.
Use the IP Security Monitor console.
Use the IPSec Policy Management console.
第12题:
placement of the logical volume
stripe size of the logical volume
inter-disk policy of the logical volume
intra-disk policy of the logical volume
第13题:
A.IDS
B.IPS
C.Firewall
D.Switch
第14题:
A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
第15题:
A companys legal and regulatory departments have drafted a new policy in which emails must be retained for no longer than three years. Which of the following locations should an administrator configure when complying with the new policy?()
第16题:
下列哪些设备属于安全设备()。
第17题:
An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
第18题:
ou are the network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. All client computers run Windows XP Professional.Two of the servers on the network contain highly confidential documents. The company’s written security policy states that all network connections with these servers must be encrypted by using an IPSec policy.You place the two servers in an organizational unit (OU) named SecureServers. You configure a Group Policy object (GPO) that requires encryption for all connections. You assign the GPO to the SecureServers OU. You need to verify that users are connecting to the two servers by using encrypted connections. What should you do?()
第19题:
A System p administrator is looking at changing attributes of a logical volume. Which of the following must be defined when it is created()
第20题:
another name for a firewall deployed in routed mode
another name for a firewall deployed in transparent mode
a separation of multiple firewall security contexts on a single firewall
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
第21题:
The best option is to set up an Outlook Web App Mailbox policy.
The best option is to set up the Content Filter agent.
The best option is to set up a managed folder mailbox policy.
The best option is to set up the Attachment Filter agent.
第22题:
WEP encryption
Channel rotation
Disable SSID
WPA encryption
第23题:
netstat
traceroute
nbtstat
ping