單項(xiàng)選擇題What action should you be prepared to take when verifying a security solution?()

A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()

A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates

2.多項(xiàng)選擇題Which two components should be part of a security implementation plan?()

A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis

3.多項(xiàng)選擇題Which two are needed components when designing and implementing a security solution?()

A.detailed VLAN information
B.an incident response plan
C.results of testing the new network configuration
D.an existing hierarchical network topology
E.a security policy for your organization

4.單項(xiàng)選擇題

You are tasked with designing a security solution for your network.
 What information should be gathered prior to designing the solution?()

A.a list of applications currently in use in the network
B.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
C.detailed security device specifications
D.results from pilot network testing

5.單項(xiàng)選擇題

You are tasked with designing a security solution for your network.
 What information should be gathered prior to designing the solution?()

A.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
B.detailed security device specifications
C.results from pilot network testing
D.results from a network audit

6.單項(xiàng)選擇題

You are tasked with designing a security solution for your network. 
What information should be gathered prior to designing the solution?()

A.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
B.a list of the customer requirements
C.detailed security device specifications
D.results from pilot network testing

9.多項(xiàng)選擇題Which two items best describe a Cisco IOS IP SLA responder?()

A.required at the destination to implement Cisco IOS IP SLA services
B.improves measurement accuracy
C.required for VoIP jitter measurements
D.provides security on Cisco IOS IP SLA messages via LEAP or EAP-FAST authentication
E.responds to one Cisco IOS IP SLA operation per port
F.stores the resulting test statistics

10.多項(xiàng)選擇題Which two statements best describe Cisco IOS IP SLA?()

A.only implemented between Cisco source and destination-capable devices
B.statistics provided by syslog, CLI, and SNMP
C.measures delay, jitter, packet loss, and voice quality
D.only monitors VoIP traffic flows
E.provides active monitoring
F.provides passive monitoring

最新試題

Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()

題型:多項(xiàng)選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項(xiàng)選擇題

Which three statements are true of the Link Aggregation Control Protocol (LACP)?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:?jiǎn)雾?xiàng)選擇題

Which three statements about STP timers are true?()

題型:多項(xiàng)選擇題

Which router redundancy protocol cannot be configured for interface tracking?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()

題型:多項(xiàng)選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:?jiǎn)雾?xiàng)選擇題