当前位置:主页   - 电脑 - 认证考试 - Cisco
思科 646-573认证考试题库
来源:网络   作者:佚名   更新时间:2011-09-30
收藏此页】    【字号    】    【打印】    【关闭

  1.Look at the picture.

思科 646-573认证考试题库

  Drag and drop question. Drag the items to the proper locations.

  Correct Answers:

思科 646-573认证考试题库

  2.Look at the picture.

思科 646-573认证考试题库

  Drag and drop question. Drag the items to the proper locations.

  Correct Answers:

思科 646-573认证考试题库

  3.What is the first activity that is conducted in an IPS mode implementation?

  A: Create a Rule from a Query

  B: Tune for False Positives

  C: Install the Sensor, Schedule a Network Outage Prior to the Installation

  D: Fine Tune the Custom Policy

  Correct Answers: C

  4.Which two tasks are part of conducting a discovery workshop in the Physical Design Workshop service component? (Choose two.)

  A:Define Policies and Groups

  B:Create a Network Diagram

  C:Discuss the Customer's System Implementation Strategy

  D:Create a Design Specification Document

  E:Perform Risk Mitigation

  Correct Answers: C, E

  5.What is a key objective within the Business Case Alignment service component in the optimize phase?

  A: Clearly articulate the customer's pain points and motivation to change

  B: Conduct an analysis of the customer's security posture after the system has been in operation over time

  C: Document integration/migration requirements for new solution

  D: Present the system readiness assessment report

  E: Gather implementation requirements

  F: Conduct a discovery workshop

  Correct Answers: B

  6.The Business Requirements Development service component in the prepare phase can help to document which of the following in a customer environment? (Choose two.)

  A:Project Scope and Plan

  B:Logical-Level System Functionality

  C:Security Solution Feature and Function Specifications

  D:Security Alerts and Notification Requirements

  E:System Level Functionality

  F:Physical Topology Maps

  Correct Answers: B, F

  7.Which resource is the most critical in writing a custom CSA policy?

  A: Technology Requirements Document

  B: CSA Reference Customer Policy

  C: CSA Installation Guide

  D: CSA Agent Profiler

  Correct Answers: D

  8.Which activity is performed in Security Readiness Assessment?

  A: Assess Existing Software Operations Procedures

  B: Survey Facility Site

  C: Preliminary Technology Discovery

  D: Assessment and Remediation Planning

  Correct Answers: A

  9.Which key task is conducted as part of Problem Management?

  A: Remotely Backup Endpoint Solution Configuration and Databases

  B: Provide Software Upgrades, Updates, and Bug Fixes for the Endpoint Solution System

  C: Conduct Move, Adds, Changes

  D: Select Fault Management Tools and Products

  Correct Answers: B

  10.Which two service components are performed during the implement phase? (Choose two.)

  A:Security Readiness Assessment

  B:Staff Training

  C:Site Readiness Specification

  D:Project Kickoff

  E:Configuration Management

  F:Design Review

  Correct Answers: B, D

其它资源
来源声明

版权与免责声明
1、本站所发布的文章仅供技术交流参考,本站不主张将其做为决策的依据,浏览者可自愿选择采信与否,本站不对因采信这些信息所产生的任何问题负责。
2、本站部分文章来源于网络,其版权为原权利人所有。由于来源之故,有的文章未能获得作者姓名,署“未知”或“佚名”。对于这些文章,有知悉作者姓名的请告知本站,以便及时署名。如果作者要求删除,我们将予以删除。除此之外本站不再承担其它责任。
3、本站部分文章来源于本站原创,本站拥有所有权利。
4、如对本站发布的信息有异议,请联系我们,经本站确认后,将在三个工作日内做出修改或删除处理。
请参阅权责声明