A.Allow users to develop their own approach to network security
B.Physically secure network equipment from potential access by unauthorized individuals
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
E.Minimize network overhead by deactivating automatic antivirus client updates
第1题:
During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()
第2题:
A network vulnerability scanner is part of which critical element of network and system security?()
第3题:
What should be part of a comprehensive network security plan?()
第4题:
Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()
第5题:
Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()
第6题:
develop a policy for securing the network
monitor and test network activities for vulnerabilities
implement reflexive access lists
implement dynamic access lists
select and implement a single comprehensive virus protection program
第7题:
host security
perimeter security
security monitoring
policy management
第8题:
Internal routers within the backbone area (area 0)
Internal routers within the NSSAs
Internal routers within the stubby areas
ASBRs
ABRs
DRs and BDRs
第9题:
the ship security plan
the company security plan
the port security plan
the national security plan
第10题:
host security
perimeter security
security monitoring
policy management
第11题:
Allow users to develop their own approach to network security
Physically secure network equipment from potential access by unauthorized individuals
Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
Minimize network overhead by deactivating automatic antivirus client updates
第12题:
basic security options
simple network configuration
advanced network configuration
integrated solutions
advanced security options
point products
第13题:
What are the benefit of using Netflow?()
第14题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第15题:
You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()
第16题:
You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing an Active Directory Managment Services server named TESTKING-EX01. TestKing.com users currently make use of Outlook Web App (OWA) to access their mailboxes.During the course of day you receive an instruction form the CIO to devise a security solution plan for the organization. Management wants you to ensure that e-mail messages are stored in an encrypted formatand that the administator-defined templates are used to secure messages. What else should you incorporate?()
第17题:
An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()
第18题:
generic router and switch configuration parameters
end-to-end test plan after all components have been installed and configured
administrator assignments
rollback plan
第19题:
having alternative addressing and VLAN schemes
having a rollback plan in case of unwanted or unexpected results
running a test script against all possible security threats to insure that the solution will mitigate all potential threats
isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
第20题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第21题:
precaution measures
safety measures
security measures
emergency response measures
第22题:
a list of applications currently in use in the network
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
第23题:
a synthetic network adapter
an emulated network adapter
virtual machine queue (VMQ)
Virtual Machine Chimney