單項選擇題What action should you be prepared to take when verifying a security solution?()

A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()

A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates

2.多項選擇題Which two components should be part of a security implementation plan?()

A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis

3.多項選擇題Which two are needed components when designing and implementing a security solution?()

A.detailed VLAN information
B.an incident response plan
C.results of testing the new network configuration
D.an existing hierarchical network topology
E.a security policy for your organization

4.單項選擇題

You are tasked with designing a security solution for your network.
 What information should be gathered prior to designing the solution?()

A.a list of applications currently in use in the network
B.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
C.detailed security device specifications
D.results from pilot network testing

5.單項選擇題

You are tasked with designing a security solution for your network.
 What information should be gathered prior to designing the solution?()

A.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
B.detailed security device specifications
C.results from pilot network testing
D.results from a network audit

最新試題

Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()

題型:單項選擇題

What two things will occur when an edge port receives a BPDU?()

題型:多項選擇題

Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()

題型:單項選擇題

Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()

題型:單項選擇題

DS2 has not become the active device for Vlan103’s HSRP group even though all interfaces are active. As related to Vlan103’s HSRP group. What can be done to make the group function properly ? ()

題型:單項選擇題

Refer to the exhibit. Which statement is true about the output?()

題型:單項選擇題

Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()

題型:單項選擇題

Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()

題型:單項選擇題

Which two statements about the various implementations of STP are true?()

題型:多項選擇題

Refer to the exhibit. What does the command channel-group 1 mode desirable do? () 

題型:單項選擇題