网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

  • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
  • B、detailed security device specifications
  • C、results from pilot network testing
  • D、results from a network audit

参考答案

更多 “ You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、detailed security device specificationsC、results from pilot network testingD、results from a network audit” 相关考题
考题 When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

考题 What action should you be prepared to take when verifying a security solution?()A、having alternative addressing and VLAN schemesB、having a rollback plan in case of unwanted or unexpected resultsC、running a test script against all possible security threats to insure that the solution will mitigate all potential threatsD、isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

考题 When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()A、Perform an incremental implementation of components.B、Following the PPDIOO model, implement the entire solution and then test end-to-end to make sure that it is performing as designed.C、Implement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.D、Test the solution on a segmented portion of a lab network prior to rolling out across the entire network.

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、a list of applications currently in use in the networkB、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC、detailed security device specificationsD、results from pilot network testing

考题 As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()A、It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.B、It allows you to centralize management, automate repetitive tasks, and provision IP services easily.C、It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.D、It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.

考题 You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

考题 You are designing a solution that needs to support 40 IP phone users. Which routers model does the Cisco Single-Site Secure Network Foundation 1.1 Designing and Implementation Guide suggest for this Solution?()A、Cisco 3825B、Cisco 2851C、Cisco 3845D、Cisco 2811E、Cisco 2821F、Cisco 2801

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 You are designing the IP addressing scheme for the new Barcelona office.  Which network address or addresses are valid for your design?()A、 10.10.10.0/28B、 10.10.255.0/24C、 131.15.0.0/24D、 151.10.10.0/24E、 192.168.11.0/25

考题 Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

考题 You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

考题 You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

考题 Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、/61B、/62C、/63D、/64

考题 You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

考题 You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()A、Use two iSCSI host bus adaptersB、Use two Fibre Channel host bus adaptersC、Place the physical host servers on the same TCP/IP subnetD、Place the physical host servers on different TCP/IP subnets

考题 You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

考题 You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

考题 单选题You are designing an IP addressing strategy for your VPN solution.  How many public addresses should you use?()A  1B  25C  50D  255

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB detailed security device specificationsC results from pilot network testingD results from a network audit

考题 单选题Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A /61B /62C /63D /64

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB a list of the customer requirementsC detailed security device specificationsD results from pilot network testing

考题 单选题You are designing a solution that needs to support 40 IP phone users. Which routers model does the Cisco Single-Site Secure Network Foundation 1.1 Designing and Implementation Guide suggest for this Solution?()A Cisco 3825B Cisco 2851C Cisco 3845D Cisco 2811E Cisco 2821F Cisco 2801

考题 单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A a list of applications currently in use in the networkB IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC detailed security device specificationsD results from pilot network testing

考题 多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization

考题 单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A 1B 25C 50D 255

考题 多选题You are designing the IP addressing scheme for the new Barcelona office.  Which network address or addresses are valid for your design?()A10.10.10.0/28B10.10.255.0/24C131.15.0.0/24D151.10.10.0/24E192.168.11.0/25

考题 多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates