develop a policy for securing the network
monitor and test network activities for vulnerabilities
implement reflexive access lists
implement dynamic access lists
select and implement a single comprehensive virus protection program
第1题:
A.reject
B.community add
C.next term
D.next policy
第2题:
Which two actions, when taken in combination, will result in an effective network security solution?()
第3题:
A. The backup as copy can only be taken to disk
B. The backup as copy can only be taken to tape
C. Backup can be performed only when the instance is shutdown
D. Backup will constitute all used and unused blocks in the database
第4题:
What are two steps that are taken when a router converts a voice signal from analog to digital form?()
第5题:
Which two firewall filter actions will terminate the processing and evaluation of a packet?()
第6题:
A.PPP
B.TCP/IP
C.TCP
D.POP3
E.PPPoE
第7题:
PPTP is a combination of which of the following protocols? (Select TWO).()
第8题:
A. The backup as copy can only be taken to disk
B. The backup as copy can only be taken to tape
C. Backup can be performed only when the instance is shutdown
D. Backup will constitute all used and unused blocks in the database
第9题:
Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()
第10题:
When installing a new scanner, Windows XP does not automatically recognize the scanner. Which of the following actions should be taken?()