What should be part of a comprehensive network security plan()。A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal informat

题目
What should be part of a comprehensive network security plan()。

A.Allow users to develop their own approach to network security

B.Physically secure network equipment from potential access by unauthorized individuals

C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

E.Minimize network overhead by deactivating automatic antivirus client updates


相似考题

3.材料:Ships entering piracy risk areas must be aware of the risk of attack and should take appropriate measures to increase the level of surveillance(监督)and security on board and devise means of responding to attacks.A clear and comprehensive Ship Security Plan and the training of crews in security measures and response techniques are essential.Without clearly defined and rigorously practiced procedures,the risk of an uncoordinated response during the inevitable confusion of an attack increases the danger faced by those on board the ship.While a Ship Security Plan and crew training may not prevent an attack they should help reduce the risks if an attack takes place.Attacks by pirates or armed robbers pose an immediate threat to the safety of a ship and individual crew members.When responding to attacks,masters and crews should seek to minimize the risk to those on board and maintain effective control over the safe navigation of the ship. Finally,it is important that all incidents of piracy and armed robbery,even minor incidents,are reported in detail to the appropriate authorities as soon as practicable.Accurate knowledge of the type and extent of piracy and armed robbery of ships is valuable for assessing the risk and formulating a comprehensive response.问题:The passage implies the following except ______.A.Safety of lives onboard and the control of the safe navigation of the ship are the priority considerations when making decisions in responding to attacksB.A clear and comprehensive Ship Security Plan can be developed by notifying the appropriate authorities of piracy-related informationC.The risk of an uncoordinated response during the inevitable confusion of an attack could be decreased by clearly defined and well practiced proceduresD.The communication of piracy-related information is a useful mechanism for anti-piracy ActionsWithout clearly defined and rigorously practiced procedures,the risk of an uncoordinated response during the inevitable confusion of an attack increases the danger faced by those on board the ship.A.frequentlyB.perioicallyC.occasionallyD.strictlyWhich of the following is not mentioned as the measures taken for anti-piracy ___________.A.Risk assessment and Ship Security PlanB.security alarming system onboardC.Practices of proceduresD.communication of piracy- or security- related informationWhich of the following is correct according to the passage ___________.A.A Ship Security Plan can always define clear and comprehensive proceduresB.Rigorously practiced procedure can always prevent a piracy attackC.A well-designed Ship Security Plan and the training of crews are significant for anti-piracyD.A well-designed Ship Security Plan and the training of crews can always prevent the ship from being attacked请帮忙给出每个问题的正确答案和分析,谢谢!

4.第三组:Following a security incident, in which the response measures outlined in the Ship Security Plan (SSP) have been activated, there will be a thorough review of their effectiveness and details will be made available, on request, to persons duly authorized by the Ship&39;s Flag State Administration. The Ship Security Plan is not subject to detailed inspection (other than confirming its existence on the ship) by duly authorized officials of a port State unless there are "clear grounds" to believe that the ship is not in compliance with the requirements of SOLAS or the ISPS Code, and the only means to verify or rectify the non-compliance is to review the relevant sections of the Plan. In such cases, access to the Restricted parts of the Plan relating to the non-compliance is exceptionally allowed, but only with the consent of the Flag State, or the master. If the master, in his professional judgment, believes that such "clear grounds" exist, and allowing access to relevant sections of the Restricted part of the Plan might resolve the situation, such access can be exceptionally granted. However, this should be immediately reported by the ship to the Company Security Officer (CSO). If access to the Restricted part of the Plan is denied by the master, this should be immediately reported by the ship to the Company Security Officer for guidance and reference to the Flag State.The Confidential part of a SSP cannot be subject to non-flag State inspection unless otherwise agreed by the contracting governments concerned. Any such request or demand by port state officials to view sections of the Confidential part of the Plan will be immediately reported by the ship to the Company Security Officer for guidance and reference to the flag State before any details are revealed to non-flag State officials. The Confidential provisions, which from an integral part of this Plan, are held by the Ship Security Officer (SSO)After a security incident, the revision of the SSP will made by____.A.the CSOB.the SSOC.persons duly authorized by the Ship&39;s Flag State AdministrationD.information not given

更多“What should be part of a comprehensive network security plan()。 ”相关问题
  • 第1题:

    During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()

    • A、Position
    • B、Prepare
    • C、Design
    • D、Perform
    • E、Plan

    正确答案:E

  • 第2题:

    A network vulnerability scanner is part of which critical element of network and system security?()

    • A、host security
    • B、perimeter security
    • C、security monitoring
    • D、policy management

    正确答案:C

  • 第3题:

    What should be part of a comprehensive network security plan?()

    • A、Allow users to develop their own approach to network security.
    • B、Physically secure network equipment from potential access by unauthorized individuals.
    • C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
    • D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
    • E、Minimize network overhead by deactivating automatic antivirus client updates.

    正确答案:B

  • 第4题:

    Your virtual environment includes Windows Server 2008 R2 Hyper-V servers. You plan to deploy Microsoft Virtual Desktop Infrastructure. You plan to scale both static and dynamic deployments across several servers. You need to design a plan that supports static and dynamic deployments and that allows for capacity growth without outages. What should you include in your plan?()

    • A、Use the Remote Desktop Connection Broker and failover clustering
    • B、Use the Remote Desktop Gateway and network load balancing
    • C、Use network load balancing and failover clustering
    • D、Use DNS round-robin and network load balancing

    正确答案:A

  • 第5题:

    Your network contains a computer named Computer1 that runs Windows 7.You need to verify if Computer1 has active DirectAccess connections to the network.What should you do?()

    • A、From Network Connections, right-click the active network connection, and then click Status.
    • B、From Network Connections, select the active network connection, and then click Diagnose this connection.
    • C、From Windows Firewall with Advanced Security, click Monitoring, and then click Connection Security Rules.
    • D、From Windows Firewall with Advanced Security, click Monitoring, click Security Associations, and then click Main Mode.

    正确答案:D

  • 第6题:

    多选题
    Which two actions, when taken in combination, will result in an effective network security solution?()
    A

    develop a policy for securing the network

    B

    monitor and test network activities for vulnerabilities

    C

    implement reflexive access lists

    D

    implement dynamic access lists

    E

    select and implement a single comprehensive virus protection program


    正确答案: A,B
    解析: 暂无解析

  • 第7题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

     host security

    B

     perimeter security

    C

     security monitoring

    D

     policy management


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    You are developing a verification plan for an upcoming OSPF implementation. Part of this plan is to verify the status of type 3 LSAs within the network. Which routers should you verify first to ensure that the configuration s are correct for generating type 3 LSAs?()
    A

    Internal routers within the backbone area (area 0)

    B

    Internal routers within the NSSAs

    C

    Internal routers within the stubby areas

    D

    ASBRs

    E

    ABRs

    F

    DRs and BDRs


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    The ship security assessment is an essential and integral part of the process of developing and updating()
    A

    the ship security plan

    B

    the company security plan

    C

    the port security plan

    D

    the national security plan


    正确答案: A
    解析: 暂无解析

  • 第10题:

    单选题
    A network vulnerability scanner is part of which critical element of network and system security?()
    A

    host security

    B

    perimeter security

    C

    security monitoring

    D

    policy management


    正确答案: C
    解析: 暂无解析

  • 第11题:

    单选题
    What should be part of a comprehensive network security plan()。
    A

    Allow users to develop their own approach to network security

    B

    Physically secure network equipment from potential access by unauthorized individuals

    C

    Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

    D

    Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

    E

    Minimize network overhead by deactivating automatic antivirus client updates


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    What are three characteristics that buyers of Cisco Small Business routers typically look for?()
    A

    basic security options

    B

    simple network configuration

    C

    advanced network configuration

    D

    integrated solutions

    E

    advanced security options

    F

    point products


    正确答案: D,E
    解析: 暂无解析

  • 第13题:

    What are the benefit of using Netflow?()

    • A、Network, Application & User Monitoring
    • B、Network Planning
    • C、Security Analysis
    • D、Accounting/Billing

    正确答案:A,C

  • 第14题:

    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

    • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
    • B、a list of the customer requirements
    • C、detailed security device specifications
    • D、results from pilot network testing

    正确答案:B

  • 第15题:

    You need to configure a computer to encrypt all inbound connections by using IPSec. What should you do?()

    • A、From Network and Sharing Center, click Connect to a network.
    • B、From Network and Sharing Center, click Set up a new connection or network.
    • C、From Windows Firewall with Advanced Security, click Inbound Rules and then click New Rule.
    • D、From Windows Firewall with Advanced Security, click Connection Security Rules and then click NewRule.

    正确答案:D

  • 第16题:

    You work as the exchange administrator at TestKing.com. The TestKing.com network contains an Exchange Server 2010 Organization. You are responsible for managing an Active Directory Managment Services server named TESTKING-EX01. TestKing.com users currently make use of Outlook Web App (OWA) to access their mailboxes.During the course of day you receive an instruction form the CIO to devise a security solution plan for the organization. Management wants you to ensure that e-mail messages are stored in an encrypted formatand that the administator-defined templates are used to secure messages. What else should you incorporate?()

    • A、You should consider incorporating Domain Security into the plan.
    • B、You should consider incorporating Secure/Multipurpose Internet Mail Extensions (S/MIME) into theplan.
    • C、You should consider incorporating a legal hold into the plan
    • D、You should consider incorporating Outlook Protection Rules into the plan.

    正确答案:D

  • 第17题:

    An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()

    • A、a synthetic network adapter
    • B、an emulated network adapter
    • C、virtual machine queue (VMQ)
    • D、Virtual Machine Chimney

    正确答案:B

  • 第18题:

    单选题
    You are planning a new VLAN-based network solution.  What is one item you should consider when creating your implementation plan as it concerns VLANs?()
    A

    generic router and switch configuration parameters

    B

    end-to-end test plan after all components have been installed and  configured

    C

    administrator assignments

    D

    rollback plan


    正确答案: A
    解析: 暂无解析

  • 第19题:

    单选题
    What action should you be prepared to take when verifying a security solution?()
    A

    having alternative addressing and VLAN schemes

    B

    having a rollback plan in case of unwanted or unexpected results

    C

    running a test script against all possible security threats to insure that the solution will mitigate all potential threats

    D

    isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    B

    detailed security device specifications

    C

    results from pilot network testing

    D

    results from a network audit


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    The Ship Security Plan should indicate the operational and physical () the ship itself should take to ensure it always operates at security level 1.
    A

    precaution measures

    B

    safety measures

    C

    security measures

    D

    emergency response measures


    正确答案: C
    解析: 暂无解析

  • 第22题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    a list of applications currently in use in the network

    B

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    C

    detailed security device specifications

    D

    results from pilot network testing


    正确答案: B
    解析: 暂无解析

  • 第23题:

    单选题
    An administrator named Admin1 plans to deploy operating systems to the planned VMs. You need to recommend a configuration plan for the VMs. The plan must ensure that the operating systems can be deployed to the VMs. What should you include in the recommendation?()
    A

    a synthetic network adapter

    B

    an emulated network adapter

    C

    virtual machine queue (VMQ)

    D

    Virtual Machine Chimney


    正确答案: B
    解析: 暂无解析