单选题What is needed to verify that a newly implemented security solution is performing as expected? ()Aa detailed physical and logical topologyBa cost analysis of the implemented solution Cdetailed logs from the AAA and SNMP serversDresults from audit testing of the implemented solution

单选题
What is needed to verify that a newly implemented security solution is performing as expected? ()
A

a detailed physical and logical topology

B

a cost analysis of the implemented solution 

C

detailed logs from the AAA and SNMP servers

D

results from audit testing of the implemented solution


参考解析

解析: 暂无解析

相关考题:

(c) What changes to Churchill’s existing marketing mix will be needed to achieve the three strategic goals?(15 marks)

—Some friends say when they get the article, ______________. —That happens. So close quality control is needed to avoid e-shoppers' fraud. A it's quite different from what they saw on the website advertisement ;B it's quite same to what they saw on the website advertisement ;C it's easy to lose personal information

A requirement is simply a statement of what the system must do or what characteristics it needs to have. Requirements evolve from broad statements of overall (71)from the system to detailed statements of the business capabilities that a system should support to detailed technical statements of the way in which the capabilities will be implemented in the new system. (72)focus on describing how to create the software product that will be produced from the project Nonfunctional requirements are primarily used in the design phase when decisions are made about the user interface, the hardware and software, and the system's underlying architecture. The system's physical and technical environments would be considered (73). The speed, capacity, and reliability of the system belong to (74).(75)describes that who has authorized access to the system under what circumstances.(74)应选?A.security requirementB.performance requirementC.technical requirementD.information requirement

You are evaluating whether to use express installation files as an update distribution mechanism. Which technical requirement is met by using the express installation files?()A、Newly implemented technologies must minimize the impact on LAN traffic.B、Newly implemented technologies must minimize the storage requirements.C、Newly implemented technologies must minimize the amount of bandwidth used on Internet  connections.D、All patches and updates must be tested in a non-production environment before they are applied to production servers.

Who should DECIDE how a company should approach security and what security measures should be implemented?谁应该决定一个公司应该如何对待安全以及实施什么样的安全措施?()A、Data owner 数据拥有者B、Auditor 审计员C、The information security specialist 信息安全专家D、Senior management 高级管理者

There's a new cafeteria at the corner. How about going there for supper? ()A、Fine. But it‘s my treat this time.B、It‘s newly decorated.C、Let‘s look at the menu first.D、I have no idea about what to order.

You have just created a new VLAN on your network for inter-VLAN routing.  What is one step that you should include in your VLAN-based implementation and verification plan?()A、Verify that different native VLANs exist between two switches for security purposes.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the proper IP address space assigned to it for the new VLAN. D、Verify that the VLAN virtual interface has been correctly created and enabled.

What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()A、 Smaller companies are at less risk than larger enterprises, so their security needs are not as great.B、 Business strategy should directly relate to the security policy and budget.C、 The designated security expert should report to the IT department, since that is where thesolution will be implemented.D、 Security should be a continuous process.E、 Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

What is the key objective of the plan phase? Select exactly 1 answer(s) from the following:()。A、identify the activities involved in installing and configuring equipment at a customer’s site or sitesB、Describe the day-to-day activities required to support, manage, and monitor a newly implemented systemC、Assess current network readiness, site readiness, and operational readiness in preparation for designing a solution proposalD、Gain an understanding of high-level business and technical requirement

You have just created a new VLAN on your network.  What is one step that you should include in your VLAN-based implementation and verification plan? ()A、Verify that trunked links are configured to allow the VLAN traffic.B、Verify that the switch is configured to allow for trunking on the switch ports.C、Verify that each switch port has the correct IP address space assigned to it for the new VLAN.D、Verify that different native VLANs exist between two switches for security purposes.

What is needed to verify that a newly implemented security solution is performing as expected? ()A、a detailed physical and logical topologyB、a cost analysis of the implemented solution C、detailed logs from the AAA and SNMP serversD、results from audit testing of the implemented solution

What is a reason for reviewing the user requirements document with the client?()A、To gain the client’s acceptance of the detailed designB、To verify mutual understanding of project resourcesC、To verify mutual understanding of the detailed project planD、To verify mutual understanding of targeted product performanceE、To verify mutual understanding of the tests that will be done after the product is completed

What is the primary purpose of the Technical and Delivery Assessment (TDA)?()A、Identify, assess, and mitigate technical risks.B、Verify pricing and gather components for special bid submission.C、Verify the proposed solution will fit within the customer's budget.D、Review competitive offerings, system performance and delivery schedules.

You are the desktop administrator for your company. The company's network contains 500 Windows XP Professional computers. The information security department releases a new security template named NewSec.inf. You import NewSec.inf into a security database named NewSec.sdb. You analyze the result, and you review the changes that the template makes. You examine the security policies that are defined in NewSec.inf. You discover that the settings in NewSec.inf have not been implemented on your computer. You need to ensure that the settings in NewSec.inf overwrite the settings in your computer's local security policy. What are two possible ways to achieve this goal?()A、Run the Secedit /configure /db C:/NewSec.sdb command.B、Run the Secedit /refreshpolicy machine_policy command.C、Copy NewSec.inf to the C:/Windows/Inf folder. D、Copy NewSec.sdb to the C:/Windows/System32/Microsoft/Protect folder. E、Use the Security Configuration and Analysis console to open NewSec.sdb and then to perform a Configure operation. F、Use the Security Configuration and Analysis console to export NewSec.sdb to the Defltwk.inf security template.

You have implemented folder compression on the Windows 2000 Server and Windows 2000 Professional computers on your network. A user named Julia copies a compressed folder from an NTFS partition on her Windows 2000 Workstation to a shared NTFS folder on a remote Windows 2000 Server.  What effect will this have on the newly created folder?()A、The newly created folder will retain its original compression state.B、The newly created folder will inherit the compression state of the target folder.C、The newly created folder will be automatically uncompressed.D、Folder compression depends on the users access permissions.

You need to recommend a security strategy for WebApp2 that meets the company’s applicaton  requirements.What should you include in the recommendation?()A、Basic authentication and connection security rulesB、Basic authentication and SSLC、Digest authentication and connection security rulesD、Digest authentication and SSL

单选题What is a reason for reviewing the user requirements document with the client?()ATo gain the client’s acceptance of the detailed designBTo verify mutual understanding of project resourcesCTo verify mutual understanding of the detailed project planDTo verify mutual understanding of targeted product performanceETo verify mutual understanding of the tests that will be done after the product is completed

单选题You need to design a method to deploy security configuration settings to servers. What should you do?()ARun the Resultant Set of Policy wizard with a Windows Management Instrumentation (WMI) filter on each department’s Server OUBLog on to each server and use local policy to configure and manage the security settingsCCreate a customer security template. Log on to a domain controller and run the seceditcommand to import the security templateDCreate a customer security template. Create a GPO and import the security template. Link the GPO to each department’s Server OU

单选题() means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.AShip security officerBCompany security officerCPort facility security officerDPSC officer

单选题What is the objective of Diffie-Hellman?()Aused to verify the identity of the peerBused between the initiator and the responder to establish a basic security policyCused to establish a symmetric shared key via a public key exchange processDused for asymmetric public key encryption

单选题What is a primary differentiator between pSeries eWLM (Enterprise Workload Manager) and WLM (Workload Manager)?()ApSeries eWLM can create classes while pSeries WLM can create tiers.BpSeries eWLM can create tiers while pSeries WLM can create classes.CpSeries eWLM is implemented over multiple O/S images while pSeries WLM is implemented within an individual O/S image.DpSeries eWLM is implemented within an individual O/S image while pSeries WLM is implemented over multiple O/S images.

单选题What is the key objective of the plan phase?()AIdentify the activities involved in installing and configuring equipment at a customer’s site or sitesBDescribe the day-to-day activities required to support, manage, and monitor a newly implemented systemCAccess current network readiness, site readiness, and operational readiness in preparation for designing a solution proposalDGain an understanding of high-level business and technical requirements

单选题What is an important step to take when verifying a newly proposed network security solution? ()ATest the design on a pilot network for expected results prior to implementing on the production network.BRun a network audit to determine types of traffic in use on the network.CLaunch campus updates into the production network and monitor impact to see if configuration changes are needed.DCreate an interruption of data flow to determine test back-door access methods.

单选题What is the primary objective of the plan phase()AAssess the existing environments to determine if it can support the proposed system.BIdentify the activities for installing and configuring the equipment at the customer sites.CGather high-level solution requirements, and understand the customer business needs an the opportunity.DPrepare the activities for day-to-day support, management, and monitoring of the newly implemented system.

多选题What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()ASmaller companies are at less risk than larger enterprises, so their security needs are not as great.BBusiness strategy should directly relate to the security policy and budget.CThe designated security expert should report to the IT department, since that is where thesolution will be implemented.DSecurity should be a continuous process.ESecurity solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

单选题There's a new cafeteria at the corner. How about going there for supper? ()AFine. But it‘s my treat this time.BIt‘s newly decorated.CLet‘s look at the menu first.DI have no idea about what to order.

单选题What did Jose Bove and his people do in 1999 to protest against McDonald’s?AThey organized a strike.BThey protested outside a McDonald’s.CThey refused to go to a newly-built McDonald’s.DThey destroyed a McDonald’s under construction.