A.ATM
B.IDS
C.IOS
D.IOX
E.IPS
F.SDM
第1题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第2题:
Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()
第3题:
A network administrator needs to configure port security on a switch.which two statements are true?()
第4题:
You are tasked with designing a security solution for your network. What information should be gathered prior to designing the solution?()
第5题:
Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()
第6题:
Your company uses Network Access Protection (NAP) to enforce policies on client computers that connect to the network. Client computers run Windows 7. A Group Policy is used to configure client computers to obtain updates from Windows Server Update Services (WSUS).Company policy requires that updates labeled Important and Critical must be applied before client computers can access network resources.You need to ensure that client computers meet the company policy requirement. What should you do?()
第7题:
Cisco Trust Agent
Cisco Self-Defending Network
Cisco Secure Access Control
Cisco Network Admission Control
第8题:
Enable BPD guard
Disable CDP on ports where it is not necessary
Place unused ports in a common unrouted VLAN
Prevent automatic trunk configuration
Implement port security
第9题:
Cisco Network Assistant
Cisco Security Device Manager
Cisco Device Manager
Cisco Adaptive Security Device Manager
第10题:
intrusion protection
identity
secure connectivity
security management
第11题:
intrusion protection
identity
secure connectivity
security management
第12题:
displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement
has two modes of operationinteractive and non-interactive
automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router
uses interactive dialogs and prompts to implement role-based CLI
requires users to first identify which router interfaces connect to the inside network and which connectto the outside network
第13题:
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
第14题:
The Schuyler and Livingston Iron Works has been working on getting its network security undercontrol. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerabilityscanners to proactively identify areas of weakness, and it monitors and responds to securityevents as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fastlately and wants to make sure it is up to date on security measures. Which two areas of securitywould you advise the company to strengthen? ()
第15题:
The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()
第16题:
What are two security appliances that can be installed in a network? (Choose two.)()
第17题:
Your company uses network access protection (NAP) to enforce policies on client computers that connect to the network. Client computers run windows vista. A group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and critical must be applied before client computers can access network resources. You need to ensure that client computes meet the company policy requirement. What should you do?()
第18题:
You are the network administrator for TestKing. Your network consists of a single Active Directory domain named All network servers run Windows Server 2003, and all 200 client computers run Windows XP Professional. Software Update Services (SUS) is installed with default settings on a server named TestKing5. You discover that a critical security update for Internet Explorer is not installed on any client computer. You verify that the update was downloaded from the Internet to TestKing5. You also verify that more recent security updates are installed. You need to investigate the cause of this problem. You will use the SUS administration console on TestKing5. Which data should you evaluate? ()(Choose two)
第19题:
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
results from a network audit
第20题:
a list of applications currently in use in the network
IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
detailed security device specifications
results from pilot network testing
第21题:
ATM
IDS
IOS
IOX
IPS
SDM
第22题:
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
第23题:
ATM
IDS
IOS
IOX
IPS
SDM