A.Smallercompaniesareatlessriskthanlargerenterprises,sotheirsecurityneedsarenotasgreat.
B.Businessstrategyshoulddirectlyrelatetothesecuritypolicyandbudget.
C.ThedesignatedsecurityexpertshouldreporttotheITdepartment,sincethatiswherethesolutionwillbeimplemented.
D.Securityshouldbeacontinuousprocess.
E.Securitysolutionsshouldcomefrommultiplevendorstomakeiteasiertocoordinatesecurityeventsfromthepointoforigin.
第1题:
A.BPII
B.SPII-Plus
C.FPII
D.EPII-Plus
E.HPII
F.HPII-PIus
第2题:
A.BGP
B.IGRP
C.ISIS
D.OSPF
E.EIGRP
第3题:
A.securitycontexts
B.-transparentfirewall
C.WebVPN
D.Active/Activefailover
E.lowlatencyqueuing
F.AIP-SSMintrusionprevention
第4题:
A.accesspointcertificationandsoftwarecontrol
B.compressionandLayer3addressmapping
C.Layer3addressinganddistribution
D.packetencapsulation,fragmentation,andformatting
E.SNMPmonitoringservices
第5题:

A.Alltheconfiguredneighborsareinautonomoussystem100.
B.ThepeergroupshortenstheIBGPconfiguration.
C.ThepeergroupshortenstheEBGPconfiguration.
D.OnlytheoutgoingfiltersareappliedtoBGPupdates.
E.ThreeAS-pathfiltersareappliedtoeachBGPneighbor.
第6题:
Thenetworksecuritypolicyrequiresthatonlyonehostbepermittedtoattachdynamicallytoeachswitchinterface.Ifthatpolicyisviolated,theinterfaceshouldshutdown.Whichtwocommandsmustthenetworkadministratorconfigureonthe2950Catalystswitchtomeetthispolicy?(Choosetwo.)()
A.Switch1(config-if)#switchportport-securitymaximum1
B.Switch1(config)#mac-address-tablesecure
C.Switch1(config)#access-list10permitiphost
D.Switch1(config-if)#switchportport-securityviolationshutdown
E.Switch1(config-if)#ipaccess-group10
第7题:
Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)
第8题:
As ASM instance mounts an ASM control file
An ASM instance uses the ASMB process for rebalancing of disks within a disk group
Automatic Memory Management is enabled in an ASM instance even when the MEMORY_TARGET parameter is not set explicitly
An RDBMS instance gets connected to an ASM instance using ASMB as a foreground process when the database instance is started
第9题:
A.AnACLcanbeappliedtomultipleinterlaces.
B.AnACLwildcardmaskisidenticaltoanIPsubnetmask.
C.TheremaybemultipleACLsperprotocol,perdirection,andperinterface.
D.Thereisan"implicitdeny"attheendofanACLandwillresultinadroppedpacket.
E.AnACLactsonallpackets,thoseflowingthrutherouterandthoseoriginatedbytherouteritself.
F.AnACLwillbeprocessedfromtoptobottomandmayhavemultiplematchesthatwillactonthepacketthatisbeingtested.
第10题:
A.AirDefenseforwirelessIDSisrequiredbyautonomousAPs.
B.2.40HzCKmanagementcanmonitorboth802.11andnon-802.11CKinterference.
C.APsonlymonitortheRFchannelsthatareservicingtheclients.
D.CiscoorCCXcompatibleclientcardscanextendtheCKIDSserviceforautonomousAPs.
E.AutonomousAPsmustbededicatedIDSsensorswhilelightweightAPscancombineclienttrafficandRFmonitoring.
第11题:

A.EnableportaddresstranslationfortrafficsourcedfromthePartnerNetPCtotheDMZ1server.
B.DisableNATcontrolonDM72andtheInsideinterfacesonly.
C.EnablestaticNATtranslationfortheDMZ1server,andthenuseanACLtopermitthePartnerNetPCtraffictotheDMZ1server.
D.DisableNATcontrolontheDMZ1interfaceonly.
E.LowerthesecurityleveloftheDMZ2interfaceto30.
F.RaisethesecuritylevelofthePartnerNetinterfaceto55.
第12题:
A.TheAironetDesktopUtility(ADU)canbeusedtoestablishtheassociationbetweentheclientadapterandtheaccesspoint,manageauthenticationtothewirelessnetwork,andenabledataencryption.
B.TheAironetDesktopUtility(ADU)andtheMicrosoftWirelessConfigurationManagercanbeusedatthesametimetoconfigurethewirelessclientadapter.
C.TheAironetDesktopUtility(ADU)cansupportonlyonewirelessclientadapterinstalledandusedatatime.
D.TheAironetDesktopUtility(ADU)profilemanagerfeaturecancreateandmanageonlyoneprofileforthewirelessclientadapter.
E.WhentheuserselectsadifferentprofileintheAironetDesktopUtility(ADU),thesettingsforthewirelessclientadapterarechangedonlyafterareboot.
第13题:
A.copier
B.microwaveoven
C.toaster
D.cordlessphone
E.IPphone
F.AMradio
第14题:
A.Itestablishesastaticroutetothe172.16.3.0network.
B.Itestablishesastaticroutetothe192.168.2.0network.
C.Itconfigurestheroutertosendanytrafficforanunknowndestinationtothe172.16.3.0network.
D.Itconfigurestheroutertosendanytrafficforanunknowndestinationouttheinterfacewiththeaddress192.168.2.4.
E.Itusesthedefaultadministrativedistance.
F.Itisaroutethatwouldbeusedlastifotherroutestothesamedestinationexist.
第15题:
When a router receives a failure response, it stops querying authentication methods.
When a router receives an error response, it stops querying authentication methods.
If the router receives a failure response from an authentication method, it queries the next method.
The router does not differentiate between failure and error responses; the authentication process is always interrupted.
If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.