第1题:
Computer ( ) focuses on protecting information,hardware,and software,and software from unauthorized use and damade.
A.network B.virus C.security D.architecture
第2题:
A.Allow users to develop their own approach to network security
B.Physically secure network equipment from potential access by unauthorized individuals
C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
E.Minimize network overhead by deactivating automatic antivirus client updates
第3题:
A refusal to work part of the day only may ______ to be a strike even though such refusal is not in breach of contract.
A.hold
B.be held
C.be maintained
D.be reported
第4题:
第5题:
第6题:
Why would a network administrator configure port security on a switch?()
第7题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第8题:
A network vulnerability scanner is part of which critical element of network and system security?()
第9题:
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise networks.These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(6) .Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(7)activity. For many organizations, however,the operational complexity and costs to ensure safe third party network access have been prohibitive. Fifty-two percent of surveyed CISOs state that they currently use a moat and castle's security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch (8) of service attacks or steal (9) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with (10) and worms acquired from unprotected public networks. Hackers masquer-ading as internal users can take advantage of weak internal security to gain access to confidential information. 空白处(9)应选择()
第10题:
Content storage networking
Network optimization
Network management
Network security
第11题:
The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.
The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANs
The Cisco Unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.
The Cisco unified Wireless Network extends wireless awareness into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.
第12题:
Allow users to develop their own approach to network security
Physically secure network equipment from potential access by unauthorized individuals
Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten
Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported
Minimize network overhead by deactivating automatic antivirus client updates
第13题:
A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports
第14题:
To compete in today's fast-paced competitive environment, organizations are increasingly allowing contractors, partners, visitors and guests to access their internal enterprise network. These users may connect to the network through wired ports in conference rooms or offices, or via wireless access points. In allowing this open access for third parties, LANs become(71). Third parties can introduce risk in a variety of ways from connecting with an infected laptop to unauthorized access of network resources to(72) activity. For many organizations, however, the operational complexity and costs to ensure safe third party network access has been prohibitive. Fifty-two percent of surveyed CISOs stated that they currently use a moat and castle" security approach, and admit that defenses inside the perimeter are weak. Threats from internal users are also increasingly a cause for security concerns. Employees with malicious intent can launch(73) of service attacks or steal(74) information by snooping the network. As they access the corporate network, mobile and remote users inadvertently can infect the network with(75) and worms acquired from unprotected public networks. Hackers masquerading as internal users can take advantage of weak internal security to gain access to confidential information.
A.damageable
B.susceptible
C.vulnerable
D.changeable
第15题:
第16题:
第17题:
Why would a network administrator configure port security on a switch?()
第18题:
How does the Cisco Security Agent proactively stop both known and unknown attacks?()
第19题:
Which two statements best describe the Cisco Unified Wireless Network?()
第20题:
What should be part of a comprehensive network security plan?()
第21题:
implemented
implied
impossible
improper
第22题:
to prevent unauthorized Telnet access to a switch port
to limit the number of Layer 2 broadcasts on a particular switch port
to prevent unauthorized hosts from accessing the LAN
to protect the IP and MAC address of the switch and associated ports
to block unauthorized access to the switch management interfaces over common TCP ports
第23题:
hold
be held
be maintained
be reported