第1题:
第2题:
What are two reasons that a network administrator would use access lists (Choose two.)()。
第3题:
Which two statements apply to dynamic access lists?()
第4题:
Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address?()
第5题:
What is the goal of the borderless network architecture?()
第6题:
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
第7题:
The root id is set so that direct login is disabled. Information must be reviewed relating to when root access was obtained. In which of the following files is this information located?()
第8题:
to provide users withA single device that permits access to information anywhere
to provide users with the same productivity and access to information no matter where are or which device they use
to eliminate the need for border security and firewalls
to provide companies withA way to extend their security and control over employees on the internet
第9题:
Reduction of processing in wireless controllers
Distributed approach to authentication, encryption, and policy enforcement
Access point discovery, information exchange, and configuration
Provides security by blocking communication between access points and wireless clients
None of the other alternatives apply.
第10题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第11题:
/var/adm/sulog
/var/adm/wtmp
/etc/security/user
/etc/security/failedlogin
第12题:
The ability to detect and prevent malicious traffic.
The ability to associate security breaches with a specific user.
Converged management of network and security events, network flow data, and identity information.
Consistent device management across administrative realms.
第13题:
第14题:
LDAP is being utilized throughout the Company Wireless network. Which issue or set of issues does the Lightweight Access Point Protocol (LWAPP) address? ()
第15题:
What are two benefits of integrating Junos Pulse Access Control Service with Security Threat Response Manager (STRM)?()
第16题:
The LWAPP (Lightweight Access Point Protocol) is in use within the Company wireless LAN. Which statement is true about this protocol?()
第17题:
What is the goal of the borderless network architecture?()
第18题:
A technician works in a datacenter that is shared by multiple companies. The technician isconcerned with preventing the theft of proprietary information by other technicians with access to the datacenter. Which of the following is the BEST way to prevent data theft in this scenario?()
第19题:
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()
第20题:
Configure a captive-portal service that redirects all traffic back to the Junos Pulse Access Control Service.
Configure a security policy that references the unified-access-control captive-portal service.
Configure a captive-portal service that redirects unauthenticated traffic back to the Junos Pulse Access Control Service.
Configure a security policy that references the unified-access-control intranet-controller service.
第21题:
Real-time frame exchange is accomplished within the access point.
The control traffic between the client and the access point is encapsulated with the LWAPP.
Authentication, security, and mobility are handled by the access point.
Data traffic between the client and the access point is encapsulated with LWAPP.
None of the other alternatives apply
第22题:
Session length
User browser information
Session IP address
User identity information
第23题:
catalyst switches
adaptive security appliances
intrusion prevention systems
protect link gateway
第24题:
to provide users with A single device that permits access to information anywhere
to provide users with the same productivity and access to information no matter where are or which device they use
to eliminate the need for border security and firewalls
to provide companies with A way to extend their security and control over employees on the internet