多选题What are two characteristics of the SDM Security Audit wizard?()Adisplays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementBhas two modes of operationinteractive and non-interactiveCautomatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerDuses interactive dialogs and prompts to implement role-based CLIErequires users to first identify which router interfaces connect to the inside network and which connectto the outside network

多选题
What are two characteristics of the SDM Security Audit wizard?()
A

displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implement

B

has two modes of operationinteractive and non-interactive

C

automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the router

D

uses interactive dialogs and prompts to implement role-based CLI

E

requires users to first identify which router interfaces connect to the inside network and which connectto the outside network


参考解析

解析: 暂无解析

相关考题:

What are two security appliances that can be installed in a network?() A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM

What are two characteristics of Telnet (Choose two.)()。 A.Itsendsdataincleartextformat.B.ItisnolongersupportedonCisconetworkdevices.C.ItismoresecurethanSSHD.Itrequiresanenterpriselicenseinordertobeimplemented.E.ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

What are two security appliances that can be installed in a network (Choose two.)()。 A.ATMB.IDSC.IOSD.IOXE.IPSF.SDM

What are two characteristics of the SDM Security Audit wizard?()A、displays a screen with Fix-it check boxes to let you choose which potential security-related configuration changes to implementB、has two modes of operationinteractive and non-interactiveC、automatically enables Cisco IOS firewall and Cisco IOS IPS to secure the routerD、uses interactive dialogs and prompts to implement role-based CLIE、requires users to first identify which router interfaces connect to the inside network and which connectto the outside network

What are two characteristics of Telnet (Choose two.)()。A、Itsendsdataincleartextformat.B、ItisnolongersupportedonCisconetworkdevices.C、ItismoresecurethanSSHD、Itrequiresanenterpriselicenseinordertobeimplemented.E、ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

What are two of the three predefined classes for the Cisco SDM wizard?()A、business-critical B、high priority C、middle classD、voiceE、best effortF、scavenger

What are two security appliances that can be installed in a network? ()A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM

What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()A、AlarmSeverityB、AlarmKeepaliveC、AlarmTraitsD、EventMediaE、EventAlarmF、EventAction

What are three characteristics that buyers of Cisco Small Business routers typically look for?()A、 basic security optionsB、 simple network configurationC、 advanced network configurationD、 integrated solutionsE、 advanced security optionsF、 point products

For which two types of applications can the SDM provide wizards?()A、 security servicesB、 TACACS+servicesC、 Mpls servicesD、 Routing servicesE、 Ppp0e servicesF、 Poe services

Which three statements are valid SDM configuration wizards? ()A、NATB、VPNC、STPD、Security Audit

What are two security appliances that can be installed in a network? (Choose two.)()  A、ATMB、IDSC、IOSD、IOXE、IPSF、SDM

As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()A、to provide a keepalive mechanismB、to pull event logs from the routerC、to extract relevant SNMP informationD、to perform application-level accounting

You need to design an audit strategy for Southbridge Video. Your solution must meet business requirements.What should you do?()A、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPOB、Create a new security template that enables the Audit account logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOC、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the Domain Controllers OU. Import the new security template into the new GPOD、Create a new security template that enables the Audit logon events policy for successful and failed attempts. Create a new GPO, and link it to the domain. Import the new security template into the new GPO

Certkiller .com has organizational units in the Active Directory domain. There are 10 servers in the organizational unit called Security. As an administrator at Certkiller .com, you generate a Group Policy Object (GPO) and link it to the Security organizational unit. What should you do to monitor the network connections to the servers in Security organizational unit()A、Start the Audit Object Access optionB、Start the Audit System Events optionC、Start the Audit Logon Events optionD、Start the Audit process tracking optionE、All of the above

You need to identify each help desk user who bypasses the new corporate security policy. What should you do?()A、Configure Audit Special Logon and define Special Groups.B、Configure Audit Other Privilege Use Events and define Special Groups.C、Configure Audit Sensitive Privilege Use and configure auditing for the HelpDesk group.D、Configure Audit Object Access and modify the auditing settings for the HelpDesk group.

多选题What are the characteristics of the process of documenting the layers of an existing network? ()Abegins with gathering organizational input that may be inaccurateBbegins with gathering organizational input that does not need to be supplemented by a network auditCrequires a network audit to support some upgrade decisionsDrequires a network audit to support any network restructuringEprovides reliable input for verifying network consistencyFdoes not provide reliable input for designing changes

多选题Which two are characteristics of the cost-containment business challenge?()Areducing security breachesBusing the Internet moreCreducing upgrade chargesDadopting new applications and services

单选题For the following options ,which one accurately matches the CLI command(s) to the equivalent SDM wizardthat performs similar configuration functions?()Aaaa configuration commands and the SDM Basic Firewall wizardBsetup exec command and the SDM Security Audit wizardCauto secure exec command and the SDM One-Step Lockdown wizardDCisco Common Classification Policy Language configuration commands and the SDM Site-to- Site VPN

多选题What are three configurable parameters when editing signatures in Security Device Manager (SDM)?()AAlarmSeverityBAlarmKeepaliveCAlarmTraitsDEventMediaEEventAlarmFEventAction

多选题What are two of the three predefined classes for the Cisco SDM wizard?()Abusiness-criticalBhigh priorityCmiddle classDvoiceEbest effortFscavenger

多选题Which three statements are valid SDM configuration wizards? ()ANATBVPNCSTPDSecurity Audit

多选题What are two security appliances that can be installed in a network? ()AATMBIDSCIOSDIOXEIPSFSDM

多选题Which two commands can be used to monitor firewall user authentication?()Ashow access firewall-authenticationBshow security firewall-authentication usersCshow security audit logDshow security firewall-authentication history

多选题What are two characteristics of Telnet (Choose two.)()。AItsendsdataincleartextformat.BItisnolongersupportedonCisconetworkdevices.CItismoresecurethanSSHDItrequiresanenterpriselicenseinordertobeimplemented.EItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.

多选题What are two security appliances that can be installed in a network (Choose two.)()。AATMBIDSCIOSDIOXEIPSFSDM

多选题What are three characteristics that buyers of Cisco Small Business routers typically look for?()Abasic security optionsBsimple network configurationCadvanced network configurationDintegrated solutionsEadvanced security optionsFpoint products