單項選擇題A network vulnerability scanner is part of which critical element of network and system security?()

A. host security
B. perimeter security
C. security monitoring
D. policy management


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

4.多項選擇題What are two considerations to using IP Multicast delivery? ()

A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface

最新試題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:單項選擇題

What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

題型:單項選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()

題型:單項選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:單項選擇題

Which two of these are advantages of placing the VPN device parallel to the firewall?()

題型:多項選擇題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:單項選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:單項選擇題

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

題型:單項選擇題