Smaller companies are at less risk than larger enterprises, so their security needs are not as great.
Business strategy should directly relate to the security policy and budget.
The designated security expert should report to the IT department, since that is where thesolution will be implemented.
Security should be a continuous process.
Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.
第1题:
A. when they receive a special token
B. when there is a carrier
C. when they detect no other devices are sending
D. when the medium is idle
E. when the server grants access
第2题:
()did he know what had happened during the two months when he was away
第3题:
A、That
B、It
C、What
第4题:
A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()
第5题:
What are two important considerations when using 2- or 4-channel 15216 OADMs?() (Choose two.)
第6题:
第7题:
What are two important guidelines to follow when implementing VTP?()
第8题:
A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()
A. operator training
B. cache size of the two clusters
C. fibre bandwidth capability between the sites
D. number of stacked tape drives attached to each cluster
第9题:
When one connection to a host fails in a full mesh network, which of the following is true?()
第10题:
In an Ethernet network, under what two scenarios can devices transmit?()