A network vulnerability scanner is part of which critical element of network and system security?() A. host securityB. perimeter securityC. security monitoringD. policy management

A network vulnerability scanner is part of which critical element of network and system security?()

A. host security

B. perimeter security

C. security monitoring

D. policy management


相关考题:

The broadcaster is part of a complex network of() A、distributorsB、content creatorsC、advertisersD、cable system

The purpose of a network( )is to provide a shell around the network which will protect the system connected to the network from various threats.A.firewallB.switchC.routerD.gateway

The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A. Verity full system functionalityB. Identify the main problem and question the userC. Document their findings, actions, and outcomesD. Escalate the issue to upper management

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?() A. HoneynetB. HoneypotC. Vulnerability scannerD. Network based IDS

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A. intrusion protectionB. identityC. secure connectivityD. security management

●The (75)is designed specifically as a security system for preventing unauthorized communications between one computer network and another computer network.(75)A.firewallB.protocolC.hackerD.virus

Which network technology allows for the monitoring of active communication networks to diagnose problems and gather statistics for network administration?()A、Content networkingB、Campus local-area networkingC、Network managementD、Network security

Which three roles are predefined in the Cisco UCS system?()A、Server AdminB、Network AdminC、Storage AdminD、Security Admin

The network technician is troubleshooting a network issue by implementing a new security device.After installing and configuring the device, which of the following steps should the technician takeNEXT?()A、Verity full system functionalityB、Identify the main problem and question the userC、Document their findings, actions, and outcomesD、Escalate the issue to upper management

In which network element is the IMSI Detach and IMSI Attach information stored? ()A、BSCB、HLRC、MSC/VLR

What layer of the TMN (telecommunications management network) model does CTM fit into?()A、Network management layerB、Element management layerC、Business management layerD、Network element layer

Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Storage-area network (SAN)C、Content delivery network (CDN)D、Network management

A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

The Schuyler and Livingston Iron Works has been working on getting its network security under control. It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures.Which two areas of security would you advise the company to strengthen? ()A、intrusion protectionB、identityC、secure connectivityD、security management

Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()A、Optical networkB、Network managementC、Storage-area network (SAN)D、Content delivery network (CDN)

Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

Which of the following is BEST for providing network security?()A、FirewallB、DMZC、SwitchD、IDS

Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()A、Network diagramB、Performance baselineC、Network security procedureD、Company policy

Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic

Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A、 Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B、 Use packet filtering on all inbound traffic to the cluster.C、 Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D、 Use intrusion detection on the perimeter network.

单选题A network vulnerability scanner is part of which critical element of network and system security?()A host securityB perimeter securityC security monitoringD policy management

单选题You are a network administrator for your company. The network contains a perimeter network. The perimeter network contains four Windows Server 2003, Web Edition computers that are configured as a Network Load Balancing cluster.   The cluster hosts an e-commerce Web site that must be available 24 hours per day. The cluster is located in a physically secure data center and uses an Internet-addressable virtual IP address. All servers in the cluster are configured with the Hisecws.inf template.   You need to implement protective measures against the cluster’s most significant security vulnerability.   What should you do?  ()A Use Encrypting File System (EFS) for all files that contain confidential data stored on the cluster.B Use packet filtering on all inbound traffic to the cluster.C Use Security Configuration and Analysis regularly to compare the security settings on all servers in the cluster with the baseline settings.D Use intrusion detection on the perimeter network.

单选题A network vulnerability scanner is part of which critical element of network and system security?()Ahost securityBperimeter securityCsecurity monitoringDpolicy management

多选题The Schuyler and Livingston Iron Works has been working on getting its network security under control.It has set up VPN with IPSec links to its suppliers. It has installed network vulnerability scanners to proactively identify areas of weakness, and it monitors and responds to security events as they occur. It also employs extensive access control lists, stateful firewall implementations, and dedicated firewall appliances. The company has been growing very fast lately and wants to make sure it is up to date on security measures. Which two areas of security would you advise the company to strengthen?()Aintrusion protectionBidentityCsecure connectivityDsecurity management

单选题Which network technology addresses these customer business needs: shrinking budgets and ITstaffs, more complex networks, and an increased need for network security?()AOptical networkBStorage-area network (SAN)CContent delivery network (CDN)DNetwork management

单选题Which network technology addresses these customer business needs: shrinking budgets and IT staffs, more complex networks, and an increased need for network security?()AOptical networkBNetwork managementCStorage-area network (SAN)DContent delivery network (CDN)