The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
第1题:
A. host security
B. perimeter security
C. security monitoring
D. policy management
第2题:
A network vulnerability scanner is part of which critical element of network and system security?()
第3题:
A、network configuration
B、host systems
C、routers
D、softwares
第4题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()
第5题:
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第6题:
What would you use to enforce security-policy compliance on all devices that seek to access the network?()
第7题:
Which two are needed components when designing and implementing a security solution?()
第8题:
A. Network diagram
B. Performance baseline
C. Network security procedure
D. Company policy
第9题:
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()
第10题:
You are the administrator of your company’s network. You use Security Templates to configure a Security Policy on the Windows 2000 Professional Computers in the Sales organizational unit (OU). You notice that the Computers in the Sales OU are not downloading the Security Policy settings. On each computer, the Security Policy appears in the Local Computer Policy, but is not listed as the effective policy. You want all computers in the Sales OU to have the Security Policy listed as the effective policy. How should you accomplish this task? ()