A.MARS
B.NAC
C.VPN
D.IPS
第1题:
第2题:
Why would a network administrator configure port security on a switch?()
第3题:
Which IOS security feature is configured by the ip inspect inspection-name {in | out} command?()
第4题:
The Company is concerned about Layer 2 security threats. Which statement is true about these threats? ()
第5题:
Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()
第6题:
The Company security administrator is concerned with VLAN hopping based attacks. Which two statements about these attacks are true? ()
第7题:
Which cisco security product line uses deep inspection to identify and prevent malicious attacks,resource misuse, and unauthorized access?()
第8题:
Which of the following would be used to monitor unauthorized access to data files?()
第9题:
Cisco Product Advisor
Steps to Success Portal
Secure Business Advisor
Cisco Solution Designer
第10题:
Cisco Secure Desktop (CSD)
NAC Appliance Agent (NAA)
Cisco SecurityAgent (CSA)
SSLVPN Client (SVC)
Cisco TrustAgent (CTA)
第11题:
to prevent unauthorized Telnet access to a switch port
to limit the number of Layer 2 broadcasts on a particular switch port
to prevent unauthorized hosts from accessing the LAN
to protect the IP and MAC address of the switch and associated ports
to block unauthorized access to the switch management interfaces over common TCP ports
第12题:
To prevent unauthorized Telnet access to a switch port.
To limit the number of Layer 2 broadcasts on a particular switch port.
To prevent unauthorized hosts from accessing the LAN.
To protect the IP and MAC address of the switch and associated ports.
To block unauthorized access to the switch management interfaces over common TCP ports.
第13题:
What are two characteristics of the SDM Security Audit wizard?()
第14题:
Why would a network administrator configure port security on a switch?()
第15题:
Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()
第16题:
Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()
第17题:
The cisco ironport portfolio performs which service?()
第18题:
Which online Cisco resource provides PPDIOO and Lifecycle Services methodology?()
第19题:
Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()
第20题:
Attacks are prevented by utilizing the port-security feature.
An end station attempts to gain access to all VLANs by transmitting Ethernet frames in the 802.1q encapsulation.
Configuring an interface with the switchport mode dynamic command will prevent VLAN hopping.
An end station attempts to redirect VLAN traffic by transmitting Ethernet frames in the 802.1q encapsulation.
Configuring an interface with the switchport mode access command will prevent VLAN hopping.
第21题:
MAC spoofing attacks allow an attacking device to receive frames intended for a different network host.
Port scanners are the most effective defense against dynamic ARP inspection.
MAC spoofing, in conjunction with ARP snooping, is the most effective counter-measure against reconnaissance attacks that use dynamic ARP inspection (DAI) to determine vulnerable attack points.
Dynamic ARP inspection in conjunction with ARP spoofing can be used to counter DHCP snooping attacks.
DHCP snooping sends unauthorized replies to DHCP queries.
ARP spoofing can be used to redirect traffic to counter dynamic ARP inspection.
None of the other alternatives apply.
第22题:
Cisco Trust Agent
Cisco Self-Defending Network
Cisco Secure Access Control
Cisco Network Admission Control
第23题:
catalyst switches
adaptive security appliances
intrusion prevention systems
protect link gateway