单选题Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A Network diagramB Performance baselineC Network security procedureD Company policy

题目
单选题
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
A

Network diagram

B

Performance baseline

C

Network security procedure

D

Company policy


相似考题
参考答案和解析
正确答案: D
解析: 暂无解析
更多“单选题Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A Network diagramB Performance baselineC Network security procedureD Company policy”相关问题
  • 第1题:

    An administrator has completed the installation of a new WLAN. Which of the following configuration management documents needs to be updated?()

    • A、Logical network diagram
    • B、History logs
    • C、Baseline configurations
    • D、Wiring schematics

    正确答案:A

  • 第2题:

    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()

    • A、 the business knowledge of the IT staff
    • B、 the technical knowledge of the IT staff
    • C、 the company’s business objectives
    • D、 the company’s network topology
    • E、 the IT future directions

    正确答案:C

  • 第3题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()

    • A、 Default gateway
    • B、 The ports on the switch
    • C、 Port security on the servers switch port
    • D、 Ethernet cable

    正确答案:A

  • 第4题:

    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()

    • A、Default gateway
    • B、The ports on the switch
    • C、Port security on the server's switch port
    • D、Ethernet cable

    正确答案:A

  • 第5题:

    Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()

    • A、Baseline configuration
    • B、Security policy
    • C、Performance and transaction logs
    • D、Physical network diagram

    正确答案:D

  • 第6题:

    单选题
    During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()
    A

    Prepare

    B

    Design

    C

    Position

    D

    Develop

    E

    Plan

    F

    Perform


    正确答案: B
    解析: 暂无解析

  • 第7题:

    多选题
    Which of the following statements is true about the 80/20 rule (Select all that apply)?()
    A

    20 percent of the traffic on a network segment should be local.

    B

    no more than 20 percent of the network traffic should be able to move across a backbone.

    C

    no more than 80 percent of the network traffic should be able to move across a backbone.

    D

    80 percent of the traffic on a network segment should be local.


    正确答案: B,D
    解析: 暂无解析

  • 第8题:

    单选题
    Which of the following protocols should be used to monitor network performance?()
    A

    SNTP

    B

    SMTP

    C

    HTTP

    D

    SNMP


    正确答案: A
    解析: 暂无解析

  • 第9题:

    单选题
    You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()
    A

     Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.

    B

     Configure the network adapter on the test network to disable IEEE 802.1x authentication.

    C

     Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.

    D

     Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.

    E

     Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: A
    解析: 暂无解析

  • 第11题:

    单选题
    A company wants to secure access to its internal wireless network. The company wants to use themost secure means to access the network. Which of the following is the BEST choice for wireless security in this situation?()
    A

    WEP encryption

    B

    Channel rotation

    C

    Disable SSID

    D

    WPA encryption


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()
    A

    Position

    B

    Prepare

    C

    Design

    D

    Perform

    E

    Plan


    正确答案: D
    解析: 暂无解析

  • 第13题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    • A、host security
    • B、perimeter security
    • C、security monitoring
    • D、policy management

    正确答案:C

  • 第14题:

    Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()

    • A、Network diagram
    • B、Performance baseline
    • C、Network security procedure
    • D、Company policy

    正确答案:A

  • 第15题:

    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()

    • A、IDS
    • B、IPS
    • C、Firewall
    • D、Managed PKI

    正确答案:A

  • 第16题:

    Which of the following protocols should be used to monitor network performance?()

    • A、SNTP
    • B、SMTP
    • C、HTTP
    • D、SNMP

    正确答案:D

  • 第17题:

    You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()

    • A、 Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.
    • B、 Configure the network adapter on the test network to disable IEEE 802.1x authentication.
    • C、 Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.
    • D、 Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.
    • E、 Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

    正确答案:D

  • 第18题:

    单选题
    An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
    A

    IDS

    B

    IPS

    C

    Firewall

    D

    Managed PKI


    正确答案: C
    解析: 暂无解析

  • 第19题:

    单选题
    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot. Which of the following is the FIRST thing the administrator should check?()
    A

    Default gateway

    B

    The ports on the switch

    C

    Port security on the server's switch port

    D

    Ethernet cable


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    All client computers on your company network run Windows 7 and are members of an Active Directory Domain Services domain. Employees using portable computers report that they get connected to a coffee shop wireless network from the company conference room. You need to ensure that the employees connect to the company wireless network by default from anywhere within the company premises. What should you do?()
    A

    Configure the Network authentication (Shared mode) setting.

    B

    Apply a Wireless Network Policy to set the network type to WPA-PSK.

    C

    Apply a Wireless Network Policy to automatically connect to the company wireless network.

    D

    Apply a Wireless Network Policy to set the company wireless network as the preferred network.


    正确答案: B
    解析: 暂无解析

  • 第21题:

    单选题
    An administrator replaces the network card in a web server. After replacing the network card some users can access the server but others cannot.  Which of the following is the FIRST thing the administrator should check?()
    A

     Default gateway

    B

     The ports on the switch

    C

     Port security on the servers switch port

    D

     Ethernet cable


    正确答案: D
    解析: 暂无解析

  • 第22题:

    单选题
    The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()
    A

    Verity full system functionality

    B

    Identify the main problem and question the user

    C

    Document their findings, actions, and outcomes

    D

    Escalate the issue to upper management


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Which should be the key driver for a company security policy’s creation, implementation and enforcement?()
    A

     the business knowledge of the IT staff

    B

     the technical knowledge of the IT staff

    C

     the company’s business objectives

    D

     the company’s network topology

    E

     the IT future directions


    正确答案: C
    解析: 暂无解析