單項選擇題What is an important step to take when verifying a newly proposed network security solution? ()

A.Test the design on a pilot network for expected results prior to implementing on the production network.
B.Run a network audit to determine types of traffic in use on the network.
C.Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
D.Create an interruption of data flow to determine test "back-door" access methods.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題What is needed to verify that a newly implemented security solution is performing as expected? ()

A.a detailed physical and logical topology
B.a cost analysis of the implemented solution 
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution

2.單項選擇題What action should you be prepared to take when verifying a security solution?()

A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

3.多項選擇題When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()

A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates

4.多項選擇題Which two components should be part of a security implementation plan?()

A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis

5.多項選擇題Which two are needed components when designing and implementing a security solution?()

A.detailed VLAN information
B.an incident response plan
C.results of testing the new network configuration
D.an existing hierarchical network topology
E.a security policy for your organization

最新試題

Refer to the exhibit. For what purpose is the command show ip cef used?()

題型:單項選擇題

Which two statements about the various implementations of STP are true?()

題型:多項選擇題

Which three statements about STP timers are true?()

題型:多項選擇題

If G1/0/1 on DS1 is shutdown, what will be the current priority value of the Vlan105’s group on DS1 ?()

題型:單項選擇題

What is the configured priority value of the Vlan105’s group on DS2 ?()

題型:單項選擇題

Which statement is correct about the use of the virtual interface on a WLC ?()

題型:單項選擇題

Which statement is correct about RSTP port roles?()

題型:單項選擇題

Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()

題型:單項選擇題

Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()

題型:單項選擇題

Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()

題型:單項選擇題