A security analysis at The Potomac Canal Company recommends installing an IDS appliance anda firewall appliance. These appliances should connect directly into a Layer 3 switch. A loadbalancer and SSL termination have also been recommended.Potomac’s management haveexpressed concern over the cost. You suggest using integrated blades. What is one advantage and one disadvantage of yourdesign proposal? ()
第1题:
A. A security zone can contain one or more interfaces.
B. A security zone can contain interfaces in multiple routing instances.
C. A security zone must contain two or more interfaces.
D. A security zone must contain bridge groups.
第2题:
第3题:
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
第4题:
Which file contains the attributes used to setup a new user account when executing ‘mkuser’ without any flags?()
第5题:
At which two levels of the Junos CLI hierarchy is the host-inbound-traffic command configured? ()(Choose two.)
第6题:
You have a server that runs Windows Server 2003 Service Pack 2 (SP2).You need to compare the current security settings of the server to a security template. Which tool should you use?()
第7题:
A security zone can contain one or more interfaces.
A security zone can contain interfaces in multiple routing instances.
A security zone must contain two or more interfaces.
A security zone must contain bridge groups.
第8题:
Ship security officer
Company security officer
Port facility security officer
PSC officer
第9题:
Ship security plan
Company security plan
Port facility security plan
National security plan
第10题:
the ship security plan
the company security plan
the port security plan
the national security plan
第11题:
show ike security-associations
show ipsec security-associations
show security ike security-associations
show security ipsec security-associations
第12题:
show security utm content-filtering statistics
show security flow session
show security flow statistics
show security utm content-filtering summary
第13题:
A./etc/security/limits
B./etc/security/mkuser.sys
C./etc/security/priv
D./etc/security/user
第14题:
Which Cisco security tool can best determine it a Cisco ISR router is properly secured? ()
第15题:
A System p administrator is investigating a possible security breech and wants to review information about failed login attempts to the system. Which of the following commands will show this()
第16题:
A System p administrator needs to set the default password length for all users to six characters. Which of the following files needs to be edited to accomplish this ()
第17题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()
第18题:
Ship security officer
Company security officer
Port facility security officer
PSC officer
第19题:
The Contracting Governments
The Port Authorities
The Master
The Company Security
第20题:
Ship security plan
Company security plan
Port facility security plan
National security plan
第21题:
Ship security officer
Company security officer
Port facility security officer
PSC officer
第22题:
[edit security idp]
[edit security zones security-zone trust interfaces ge-0/0/0.0]
[edit security zones security-zone trust]
[edit security screen]
第23题:
Cisco SDM Security Audit
Cisco Security MARS
Cisco Security Agent MC
Cisco Security IntelliShield
CAN
第24题:
Ship security office
Ship security officer
Ship security operator
Ship safety office