网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()
- A、 The data center would need several devices to achieve its goal.
- B、 Increased usage of standalone devices is cost-effective.
- C、 Using integrated blades would only require two devices.
- D、 Putting all security devices in a single chassis provides a single point of failure.
参考答案
更多 “A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()A、 The data center would need several devices to achieve its goal.B、 Increased usage of standalone devices is cost-effective.C、 Using integrated blades would only require two devices.D、 Putting all security devices in a single chassis provides a single point of failure.” 相关考题
考题
我是安保部经理, 将协助这次安保工作A.I’m a manager of the enterprise, who will assist you in this security departmentB.I’m a manager of the security department. , who will assist you in this security workC.The security manager who will assist you in this security work, is on the wayD.The security work will be assisted by the manager of the security department
考题
Who is responsible for the development of the ship security plan?________.A.The company security officerB.The classification societyC.The port facility security officerD.The ship security officer
考题
_______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4
考题
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]
考题
Which statement describes a security zone?()
A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.
考题
ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis()
A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user
考题
( )is not included in Information Security Risk Assessment Process.A.Establishing information security risk criteria
B.Identifying the information security risks
C.Formulating an information security risk treatment plan
D.Analysing the information security risk
考题
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN
考题
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.B、 Business strategy should directly relate to the security policy and budget.C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.D、 Security should be a continuous process.E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.
考题
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()A、fwtmp /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o
考题
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default
考题
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user
考题
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]
考题
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.
考题
You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)
考题
单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.A
Ship security officerB
Company security officerC
Port facility security officerD
PSC officer
考题
单选题Which statement describes a security zone?()A
A security zone can contain one or more interfaces.B
A security zone can contain interfaces in multiple routing instances.C
A security zone must contain two or more interfaces.D
A security zone must contain bridge groups.
考题
单选题()shall set security levels and provide guidance for protection from security incidents.A
The Contracting GovernmentsB
The Port AuthoritiesC
The MasterD
The Company Security
考题
单选题()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.A
Ship security officerB
Company security officerC
Port facility security officerD
PSC officer
考题
单选题()means a plan developed to ensure the application of measures designed to protect the port facility and ships, persons, cargo, cargo transport units and ships stores within the port facility from the risks of a security incident.A
Ship security planB
Company security planC
Port facility security planD
National security plan
考题
单选题()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.A
Ship security planB
Company security planC
Port facility security planD
National security plan
考题
单选题() means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.A
Ship security officerB
Company security officerC
Port facility security officerD
PSC officer
考题
单选题The ship security assessment is an essential and integral part of the process of developing and updating()A
the ship security planB
the company security planC
the port security planD
the national security plan
考题
多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]
考题
单选题Which operational mode command displays all active IPsec phase 2 security associations?()A
show ike security-associationsB
show ipsec security-associationsC
show security ike security-associationsD
show security ipsec security-associations
考题
单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A
Cisco SDM Security AuditB
Cisco Security MARSC
Cisco Security Agent MCD
Cisco Security IntelliShieldE
CAN
考题
单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()A
show security utm content-filtering statisticsB
show security flow sessionC
show security flow statisticsD
show security utm content-filtering summary
考题
单选题What does SSO stand for regarding ship security?()A
Ship security officeB
Ship security officerC
Ship security operatorD
Ship safety office
热门标签
最新试卷