网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

How does the Cisco Security Agent proactively stop both known and unknown attacks?()

  • A、 It reverse engineers and documents the attack
  • B、 It looks subjectively at network traffic for abnormal flows of behavior
  • C、 It creates a signature and updates the network security policies
  • D、 It actively monitors all vulnerable areas of the network

参考答案

更多 “How does the Cisco Security Agent proactively stop both known and unknown attacks?()A、 It reverse engineers and documents the attackB、 It looks subjectively at network traffic for abnormal flows of behaviorC、 It creates a signature and updates the network security policiesD、 It actively monitors all vulnerable areas of the network” 相关考题
考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

考题 What should be part of a comprehensive network security plan()。 A.Allow users to develop their own approach to network securityB.Physically secure network equipment from potential access by unauthorized individualsC.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE.Minimize network overhead by deactivating automatic antivirus client updates

考题 Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent

考题 What is an important step to take when verifying a newly proposed network security solution? ()A、Test the design on a pilot network for expected results prior to implementing on the production network.B、Run a network audit to determine types of traffic in use on the network.C、Launch campus updates into the production network and monitor impact to see if configuration changes are needed.D、Create an interruption of data flow to determine test "back-door" access methods.

考题 What makes the Cisco End-to-End solution superior to competitor offerings?()A、The Cisco Full-Service network foundation delivers a layered security approach that introduces interoperability issuesB、The Cisco Full-service Network Foundation Increases the support CostC、The Cisco Full-Service Network Foundation delivers a static single layer security approach that eliminates the interoperability issuesD、The Cisco Full-Service Network Foundation Delivers a layered security Approach that eliminates the interoperability issues

考题 The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to router) basis?()A、nGenius Real-Time MonitorB、Cisco ViewC、Device Fault ManagerD、Internetwork Performance Monitor

考题 What Cisco Security Agent Interceptor is in charge of intercepting all read/write requests to the rc files in UNIX?()A、Configuration interceptorB、Network interceptorC、File system interceptorD、Execution space interceptor

考题 Which statement is true about the Cisco Self-Defending Network?()A、The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB、The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC、The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD、The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation

考题 What should be part of a comprehensive network security plan()。A、Allow users to develop their own approach to network securityB、Physically secure network equipment from potential access by unauthorized individualsC、Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgottenD、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reportedE、Minimize network overhead by deactivating automatic antivirus client updates

考题 The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A、nGenius Real-Time MonitorB、CiscoViewC、Device Fault ManagerD、Internetwork Performance Monitor

考题 Which of the following is the advantage of Server to Server replication in a cluster environment over Disk to Disk?()A、Reduced network trafficB、Frequent BIOS updates are not requiredC、Backup agent does not need to be installedD、Provides greater overall fault tolerance

考题 Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A、 Cisco Secure Desktop (CSD)B、 NAC Appliance Agent (NAA)C、 Cisco SecurityAgent (CSA)D、 SSLVPN Client (SVC)E、 Cisco TrustAgent (CTA)

考题 How can mobile devices and wireless networks be secured?()A、 by securely deploying new applications with appropriate performance levelsB、 by providing security that is based on a multilayer,system-level approachC、 by looking subjectively at network traffic for abnormal flowsD、 by requiring a host-based hardware application

考题 Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A、 Cisco Trust AgentB、 Cisco Self-Defending NetworkC、 Cisco Secure Access ControlD、 Cisco Network Admission Control

考题 From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()A、 extends networkQoS throughout the networkB、 simplifies management of central or remotely locates access pointsC、 ensures implementation of the most recent security protocolsD、 streamlines wireless LAN managementE、 extends features for optical traffic network services

考题 Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".

考题 What should be part of a comprehensive network security plan?()A、Allow users to develop their own approach to network security.B、Physically secure network equipment from potential access by unauthorized individuals.C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.E、Minimize network overhead by deactivating automatic antivirus client updates.

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 You are a security administrator for your company. The network consists of a single Active Directory domain. All client computers run Windows XP Professional. All servers run Windows Server 2003. All computers on the network are members of the domain.    Traffic on the network is encrypted by IPSec. The domain contains a custom IPSec policy named Lan Security that applies to all computers in the domain. The Lan Security policy does not allow unsecured communication with non-lPSec-aware computers. The company’s written security policy states that the configuration of the domain and the configuration of the Lan Security policy must not be changed. The domain contains a multihomed server named Server1. Server1 isconnected to the company network, and Server1 is also connected to a test network. Currently, the Lan Security IPSec policy applies to network traffic on both network adapters in Server1. You need to configure Server1 so that it communicates on the test network without IPSec security. Server1 must still use the Lan Security policy when it communicates on the company network.  How should you configure Server1?()A、 Configure a packet filter for the network adapter on the test network to block the Internet Key Exchange (IKE) port.B、 Configure the network adapter on the test network to disable IEEE 802.1x authentication.C、 Configure the network adapter on the test network to enable TCP/IP filtering, and then permit all traffic.D、 Use the netsh command to assign a persistent IPSec policy that permits all traffic on the network adapter on the test.E、 Assign an IPSec policy in the local computer policy that permits all traffic on the network adapter on the test.

考题 单选题Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A  Cisco Trust AgentB  Cisco Self-Defending NetworkC  Cisco Secure Access ControlD  Cisco Network Admission Control

考题 单选题Which statement is true about the Cisco Self-Defending Network?()A The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation

考题 单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()A  No vulnerable applications or operating systemsB  No viruses or wormsC  Appropriate security applications and patch levelsD  Current IPS signaturesE  Cisco Security Agent

考题 单选题Which Cisco security software product mitigates Day Zero attacks on desktops and servers - stopping known and unknown attacks without requiring reconfigurations or updates on the endpoints?()A  Cisco Secure Desktop (CSD)B  NAC Appliance Agent (NAA)C  Cisco SecurityAgent (CSA)D  SSLVPN Client (SVC)E  Cisco TrustAgent (CTA)

考题 多选题Which two statements describe the functions and operations of IDS and IPS systems?()AA network administrator entering a wrong password would generate a true-negative alarm.BA false positive alarm is generated when an IDS/IPS signature is correctly identified.CAn IDS is significantly more advanced over IPS because of its ability to prevent network attacks.DCisco IDS works inline and stops attacks before they enter the network.ECisco IPS taps the network traffic and responds after an attack.FProfile-based intrusion detection is also known as anomaly detection.

考题 单选题How does the Cisco Security Agent proactively stop both known and unknown attacks?()A  It reverse engineers and documents the attackB  It looks subjectively at network traffic for abnormal flows of behaviorC  It creates a signature and updates the network security policiesD  It actively monitors all vulnerable areas of the network

考题 多选题From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()Aextends networkQoS throughout the networkBsimplifies management of central or remotely locates access pointsCensures implementation of the most recent security protocolsDstreamlines wireless LAN managementEextends features for optical traffic network services

考题 单选题How can mobile devices and wireless networks be secured?()A  by securely deploying new applications with appropriate performance levelsB  by providing security that is based on a multilayer,system-level approachC  by looking subjectively at network traffic for abnormal flowsD  by requiring a host-based hardware application