What are two security appliances that can be installed in a network?()A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM

题目
What are two security appliances that can be installed in a network?()

A.ATM

B.IDS

C.IOS

D.IOX

E.IPS

F.SDM


相似考题
更多“What are two security appliances that can be installed in a network?() ”相关问题
  • 第1题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第2题:

    Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()

    • A、 Cisco Trust Agent
    • B、 Cisco Self-Defending Network
    • C、 Cisco Secure Access Control
    • D、 Cisco Network Admission Control

    正确答案:B

  • 第3题:

    A network administrator needs to configure port security on a switch.which two statements are true?()

    • A、The network administrator can apply port security to dynamic access ports
    • B、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.
    • C、The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.
    • D、The network administrator can apply port security to EtherChannels.
    • E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

    正确答案:C,E

  • 第4题:

    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

    • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
    • B、a list of the customer requirements
    • C、detailed security device specifications
    • D、results from pilot network testing

    正确答案:B

  • 第5题:

    Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()

    • A、 Enable automatic updates on each client
    • B、 enable the Security Center on each client
    • C、 Quarantine clients that do nto have all availible security updates installed
    • D、 Disconnect the remote connection until the required updates are installed.

    正确答案:C

  • 第6题:

    Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()

    • A、Enable automatic updates on each client.
    • B、Enable the Security Center on each client.
    • C、Quarantine clients that do not have all available security updates installed.
    • D、Disconnect the connection until the required updates are installed.

    正确答案:C

  • 第7题:

    单选题
    Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()
    A

     Cisco Trust Agent

    B

     Cisco Self-Defending Network

    C

     Cisco Secure Access Control

    D

     Cisco Network Admission Control


    正确答案: A
    解析: 暂无解析

  • 第8题:

    多选题
    You want to enhance the security within the LAN and prevent VLAN hopping.  What two steps can be taken to help prevent this?()
    A

    Enable BPD guard

    B

    Disable CDP on ports where it is not necessary

    C

    Place unused ports in a common unrouted VLAN

    D

    Prevent automatic trunk configuration

    E

    Implement port security


    正确答案: E,A
    解析: 暂无解析

  • 第9题:

    多选题
    Which two management-software applications can you use to manage the Cisco Catalyst Express 500 Series Switches?()
    A

    Cisco Network Assistant

    B

    Cisco Security Device Manager

    C

    Cisco Device Manager

    D

    Cisco Adaptive Security Device Manager


    正确答案: B,A
    解析: 暂无解析

  • 第10题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: A,C
    解析: 暂无解析

  • 第11题:

    多选题
    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()
    A

    intrusion protection

    B

    identity

    C

    secure connectivity

    D

    security management


    正确答案: D,B
    解析: 暂无解析

  • 第12题:

    多选题
    What are two characteristics of the SDM Security Audit wizard?()
    A

    displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement

    B

    has two modes of operationinteractive and non-interactive

    C

    automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router

    D

    uses interactive dialogs and prompts to implement role-based CLI

    E

    requires users to first identify which router interfaces connect to the inside network and which connectto the outside network


    正确答案: D,B
    解析: 暂无解析

  • 第13题:

    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()

    • A、The ability to detect and prevent malicious traffic.
    • B、The ability to associate security breaches with a specific user.
    • C、Converged management of network and security events, network flow data, and identity information.
    • D、Consistent device management across administrative realms.

    正确答案:B,C

  • 第14题:

    The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()

    • A、 intrusion protection
    • B、 identity
    • C、 secure connectivity
    • D、 security management

    正确答案:A,B

  • 第15题:

    The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()

    • A、intrusion protection
    • B、identity
    • C、secure connectivity
    • D、security management

    正确答案:B,D

  • 第16题:

    What are two security appliances that can be installed in a network? (Choose two.)()  

    • A、ATM
    • B、IDS
    • C、IOS
    • D、IOX
    • E、IPS
    • F、SDM

    正确答案:B,E

  • 第17题:

    Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()

    • A、Enable automatic updates on each client.
    • B、Enable the security center on each client.
    • C、Quarantine clients that do not have all available security updates installed.
    • D、Disconnect the remote connection until the required updates are installed.

    正确答案:C

  • 第18题:

    You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)

    • A、The security update in the synchronization log.
    • B、The security update in the approval log.
    • C、The status of Internet Explorer 5.5x in the Monitor Server window.
    • D、The status of Internet Explorer 6.x in the Monitor Server window.

    正确答案:A,B

  • 第19题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    B

    detailed security device specifications

    C

    results from pilot network testing

    D

    results from a network audit


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()
    A

    a list of applications currently in use in the network

    B

    IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats

    C

    detailed security device specifications

    D

    results from pilot network testing


    正确答案: B
    解析: 暂无解析

  • 第21题:

    多选题
    What are two security appliances that can be installed in a network? ()
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: E,F
    解析: 暂无解析

  • 第22题:

    多选题
    What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
    A

    The ability to detect and prevent malicious traffic.

    B

    The ability to associate security breaches with a specific user.

    C

    Converged management of network and security events, network flow data, and identity information.

    D

    Consistent device management across administrative realms.


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    多选题
    What are two security appliances that can be installed in a network (Choose two.)()。
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: A,E
    解析: 暂无解析