网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()

  • A、 The data center would need several devices to achieve its goal.
  • B、 Increased usage of standalone devices is cost-effective.
  • C、 Using integrated blades would only require two devices.
  • D、 Putting all security devices in a single chassis provides a single point of failure.

参考答案

更多 “A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()A、 The data center would need several devices to achieve its goal.B、 Increased usage of standalone devices is cost-effective.C、 Using integrated blades would only require two devices.D、 Putting all security devices in a single chassis provides a single point of failure.” 相关考题
考题 我是安保部经理, 将协助这次安保工作A.I’m a manager of the enterprise, who will assist you in this security departmentB.I’m a manager of the security department. , who will assist you in this security workC.The security manager who will assist you in this security work, is on the wayD.The security work will be assisted by the manager of the security department

考题 Who is responsible for the development of the ship security plan?________.A.The company security officerB.The classification societyC.The port facility security officerD.The ship security officer

考题 _______means the level for which appropriate additional protective security measures shall be maintained for a period of time as a result of heightened risk of a security incident.A.Security level 1B.Security level 2C.Security level 3D.Security level 4

考题 At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.) A. [edit security idp]B. [edit security zones security-zone trust interfaces ge-0/0/0.0]C. [edit security zones security-zone trust]D. [edit security screen]

考题 Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

考题 ASystempadministratorneedstosetthedefaultpasswordlengthforalluserstosixcharacters.Whichofthefollowingfilesneedstobeeditedtoaccomplishthis() A./etc/security/limitsB./etc/security/mkuser.sysC./etc/security/privD./etc/security/user

考题 ( )is not included in Information Security Risk Assessment Process.A.Establishing information security risk criteria B.Identifying the information security risks C.Formulating an information security risk treatment plan D.Analysing the information security risk

考题 Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A、 Cisco SDM Security AuditB、 Cisco Security MARSC、 Cisco Security Agent MCD、 Cisco Security IntelliShieldE、 CAN

考题 What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.B、 Business strategy should directly relate to the security policy and budget.C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.D、 Security should be a continuous process.E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

考题 A System p administrator is investigating a possible security breech and wants to review  information about failed login attempts to the system.  Which of the following commands will show this()A、fwtmp  /etc/security/failedloginB、cat /etc/security/failedloginC、whoD、alog -f /etc/security/failedlogin -o

考题 Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()A、/etc/security/userB、/etc/security/passwdC、/etc/security/mkuser.sysD、/etc/security/mkuser.default

考题 A System p administrator needs to set the default password length for all users to six characters.  Which of the following files needs to be edited to accomplish this ()A、/etc/security/limitsB、/etc/security/mkuser.sysC、/etc/security/privD、/etc/security/user

考题 At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A、[edit security idp]B、[edit security zones security-zone trust interfaces ge-0/0/0.0]C、[edit security zones security-zone trust]D、[edit security screen]

考题 You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()A、Use Security Templates to correct the setting and export the security file.B、Use Security Configuration and Analysis to import the security setting. Then create a Group policy object (GPO) for the Sales QU.C、Use Secedit /RefreshPolicy Machine_Policy command.D、Use the Basicwk.inf security file settings, save the security file, and then import the fileto theComputers.

考题 You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()A、Security Templates snap-in B、Group Policy Management Console C、Security Configuration and Analysis snap-in D、Microsoft Baseline Security Analyzer (MBSA)

考题 单选题()means the person on board the ship, accountable to the master, designated by the Company as responsible for the security of the ship, including implementation and maintenance of the ship security plan and for liaison with the company security officer and port facility security officers.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题Which statement describes a security zone?()A A security zone can contain one or more interfaces.B A security zone can contain interfaces in multiple routing instances.C A security zone must contain two or more interfaces.D A security zone must contain bridge groups.

考题 单选题()shall set security levels and provide guidance for protection from security incidents.A The Contracting GovernmentsB The Port AuthoritiesC The MasterD The Company Security

考题 单选题()means the person designated as responsible for the development, implementation, revision and maintenance of the port facility security plan and for liaison with the ship security officers and company security officers.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题()means a plan developed to ensure the application of measures designed to protect the port facility and ships, persons, cargo, cargo transport units and ships stores within the port facility from the risks of a security incident.A Ship security planB Company security planC Port facility security planD National security plan

考题 单选题()means a plan developed to ensure the application of measures on board the ship designed to protect persons on board, cargo, cargo transport units, ship’s stores or the ship from the risks of a security incident.A Ship security planB Company security planC Port facility security planD National security plan

考题 单选题() means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.A Ship security officerB Company security officerC Port facility security officerD PSC officer

考题 单选题The ship security assessment is an essential and integral part of the process of developing and updating()A the ship security planB the company security planC the port security planD the national security plan

考题 多选题At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)A[edit security idp]B[edit security zones security-zone trust interfaces ge-0/0/0.0]C[edit security zones security-zone trust]D[edit security screen]

考题 单选题Which operational mode command displays all active IPsec phase 2 security associations?()A show ike security-associationsB show ipsec security-associationsC show security ike security-associationsD show security ipsec security-associations

考题 单选题Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()A  Cisco SDM Security AuditB  Cisco Security MARSC  Cisco Security Agent MCD  Cisco Security IntelliShieldE  CAN

考题 单选题Which CLI command provides a summary of what the content-filtering engine has blocked?()A show security utm content-filtering statisticsB show security flow sessionC show security flow statisticsD show security utm content-filtering summary

考题 单选题What does SSO stand for regarding ship security?()A Ship security officeB Ship security officerC Ship security operatorD Ship safety office