1.Look at the picture.
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
2.Look at the picture.
Drag and drop question. Drag the items to the proper locations.
Correct Answers:
3.What are three functions of Cisco Security Agent? (Choose three.)
A:spyware and adware protection
B:device-based registry scans
C:malicious mobile code protection
D:local shunning
E:protection against buffer overflows
F:flexibility against new attacks through customizable signatures "on the fly"
Correct Answers: A, C, E
4.How is Cisco IOS Control Plane Policing achieved?
A: by adding a service-policy to virtual terminal lines and the console port
B: by applying a QoS policy in control plane configuration mode
C: by disabling unused services
D: by rate-limiting the exchange of routing protocol updates
E: by using AutoQoS to rate-limit the control plane traffic
Correct Answers: B
5.Self-Defending Network is the Cisco vision for security systems. What is the purpose of the Cisco Secure ACS server?
A: anomaly detection
B: identity management
C: secure connectivity
D: security management
Correct Answers: B
6.Which three Cisco security products help to prevent application misuse and abuse? (Choose three.)
A:Cisco ASA 5500 Series Adaptive Security Appliances
B:NAC Appliance (Cisco Clean Access)
C:Cisco Traffic Anomaly Detector
D:Cisco Security Agent
E:Cisco Trust Agent
F:Cisco IOS FW and IPS
Correct Answers: A, D, F
7.Which statement is true about the built-in hardware-based encryption that is included with Cisco Integrated Services Routers?
A: It supports SRTP.
B: It supports 256-bit AES encryption.
C: It is two times faster than previous modules.
D: It stores VPN credentials.
Correct Answers: B
8.What are three advantages of Cisco Security MARS? (Choose three.)
A:performs automatic mitigation on Layer 2 devices
B:ensures that the user device is not vulnerable
C:fixes vulnerable and infected devices automatically
D:provides rapid profile-based provisioning capabilities
E:is network topology aware
F:contains scalable, distributed event analysis architecture
Correct Answers: A, E, F
9.Which two components should be included in a detailed design document? (Choose two.)
A:data source
B:existing network infrastructure
C:organizational chart
D:proof of concept
E:vendor availability
Correct Answers: B, D
10.What are two functions of Cisco Security Agent? (Choose two.)
A:authentication
B:control of executable content
C:resource protection
D:spam filtering
E:user tracking
Correct Answers: B, C
版权与免责声明
1、本站所发布的文章仅供技术交流参考,本站不主张将其做为决策的依据,浏览者可自愿选择采信与否,本站不对因采信这些信息所产生的任何问题负责。
2、本站部分文章来源于网络,其版权为原权利人所有。由于来源之故,有的文章未能获得作者姓名,署“未知”或“佚名”。对于这些文章,有知悉作者姓名的请告知本站,以便及时署名。如果作者要求删除,我们将予以删除。除此之外本站不再承担其它责任。
3、本站部分文章来源于本站原创,本站拥有所有权利。
4、如对本站发布的信息有异议,请联系我们,经本站确认后,将在三个工作日内做出修改或删除处理。
请参阅权责声明!