You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、detailed security device specificationsC、results from pilot network testingD、results from a network audit

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

  • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
  • B、detailed security device specifications
  • C、results from pilot network testing
  • D、results from a network audit

相关考题:

When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

What action should you be prepared to take when verifying a security solution?()A、having alternative addressing and VLAN schemesB、having a rollback plan in case of unwanted or unexpected resultsC、running a test script against all possible security threats to insure that the solution will mitigate all potential threatsD、isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system

When you create a network implementation VLAN solution, what is one procedure that you should include in your plan?()A、Perform an incremental implementation of components.B、Following the PPDIOO model, implement the entire solution and then test end-to-end to make sure that it is performing as designed.C、Implement trunking of all VLANs to ensure that traffic is crossing the network as needed before performing any pruning of VLANs.D、Test the solution on a segmented portion of a lab network prior to rolling out across the entire network.

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、a list of applications currently in use in the networkB、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsC、detailed security device specificationsD、results from pilot network testing

As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()A、It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.B、It allows you to centralize management, automate repetitive tasks, and provision IP services easily.C、It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.D、It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsB、a list of the customer requirementsC、detailed security device specificationsD、results from pilot network testing

You are designing a solution that needs to support 40 IP phone users. Which routers model does the Cisco Single-Site Secure Network Foundation 1.1 Designing and Implementation Guide suggest for this Solution?()A、Cisco 3825B、Cisco 2851C、Cisco 3845D、Cisco 2811E、Cisco 2821F、Cisco 2801

Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

You are designing the IP addressing scheme for the new Barcelona office.  Which network address or addresses are valid for your design?()A、 10.10.10.0/28B、 10.10.255.0/24C、 131.15.0.0/24D、 151.10.10.0/24E、 192.168.11.0/25

Your network is configured as shown in the following diagram.You deploy an enterprise certification authority (CA) on the internal network. You also deploy a Microsoft   Online Responder on the internal network.   You need to recommend a secure method for Internet users to verify the validity of individual certificates.   The solution must minimize network bandwidth. What should you recommend?()A、Deploy a subordinate CA on the perimeter network.B、Install a stand-alone CA and the Network Device Enrollment Service (NDES) on a server on the perimeter network.C、Install a Network Policy Server (NPS) on a server on the perimeter network. Redirect authentication  requests to a server on the internal network.D、Install Microsoft Internet Information Services (IIS) on a server on the perimeter network. Configure IIS  to redirect requests to the Online Responder on the internal network.

You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()A、Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addressesB、Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points useC、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networksD、Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks

You need to design an authentication solution for the wireless network. Your solution must meet the security requirements. What should you do?()A、Create wireless VPNs using L2TP/IPSec between the client computers to the wireless access pointB、Configure IEEE 802.1x authentication with smart cardsC、Configure the wireless network to use Wired Equivalent Privacy (WEP)D、Install and configure an Internet Authentication Service (IAS) server

Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、/61B、/62C、/63D、/64

You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A、1B、25C、50D、255

You are designing a Windows Server 2008 R2 Hyper-V environment. Your design includes a failover cluster that supports live migration. You need to ensure that the network supports this design. What should you do?()A、Use two iSCSI host bus adaptersB、Use two Fibre Channel host bus adaptersC、Place the physical host servers on the same TCP/IP subnetD、Place the physical host servers on different TCP/IP subnets

You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers

You work as the IT professional in an international company which is named wiikigo. You are experienced in implementing and administering a network operating system. You are specialized in configuring IP addressing and services. Configuring name resolution and network access and so on.Your company is desigiing its network. The network will use an IPv6 prefix of 2001:DB8: BBCC:0000::/53. You have to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A、You should use /63.B、You should use /64.C、You should use /61.D、You should use /62.

单选题You are designing an IP addressing strategy for your VPN solution.  How many public addresses should you use?()A 1B 25C 50D 255

单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()AIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsBdetailed security device specificationsCresults from pilot network testingDresults from a network audit

单选题Your company is designing its network. The network will use an IPv6 prefix of 2001:DB8:BBCC:0000::/53.You need to identify an IPv6 addressing scheme that will support 2000 subnets. Which network mask should you use?()A/61B/62C/63D/64

单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()AIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsBa list of the customer requirementsCdetailed security device specificationsDresults from pilot network testing

单选题You are designing a solution that needs to support 40 IP phone users. Which routers model does the Cisco Single-Site Secure Network Foundation 1.1 Designing and Implementation Guide suggest for this Solution?()ACisco 3825BCisco 2851CCisco 3845DCisco 2811ECisco 2821FCisco 2801

单选题You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()Aa list of applications currently in use in the networkBIP addressing design plans so that the network can be appropriately segmented to mitigate potential network threatsCdetailed security device specificationsDresults from pilot network testing

多选题Which two are needed components when designing and implementing a security solution?()Adetailed VLAN informationBan incident response planCresults of testing the new network configurationDan existing hierarchical network topologyEa security policy for your organization

单选题You are designing an IP addressing strategy for your VPN solution. How many public addresses should you use?()A1B25C50D255

多选题You are designing the IP addressing scheme for the new Barcelona office.  Which network address or addresses are valid for your design?()A10.10.10.0/28B10.10.255.0/24C131.15.0.0/24D151.10.10.0/24E192.168.11.0/25

多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates