CMS专题

多选题What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()ASmaller companies are at less risk than larger enterprises, so their security needs are not as great.BBusiness strategy should directly rela

题目
多选题
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
A

Smaller companies are at less risk than larger enterprises, so their security needs are not as great.

B

Business strategy should directly relate to the security policy and budget.

C

The designated security expert should report to the IT department, since that is where thesolution will be implemented.

D

Security should be a continuous process.

E

Security solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

参考答案和解析
正确答案: A,C
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

In an Ethernet network, under what two scenarios can devices transmit?()

A. when they receive a special token

B. when there is a carrier

C. when they detect no other devices are sending

D. when the medium is idle

E. when the server grants access


参考答案:C, D

第2题:

()did he know what had happened during the two months when he was away

  • A、A little
  • B、Little
  • C、A few
  • D、Few

正确答案:B

第3题:

() is very important that you don’t make any mistakes when you calculate those figures.

A、That

B、It

C、What


参考答案:B

第4题:

A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()

  • A、operator training
  • B、cache size of the two clusters
  • C、fibre bandwidth capability between the sites
  • D、number of stacked tape drives attached to each cluster

正确答案:C

第5题:

What are two important considerations when using 2- or 4-channel 15216 OADMs?() (Choose two.)

  • A、All "Add" channels require uniform power levels.
  • B、The flexibility of wavelengths per OADM is limited.
  • C、It is easier to balance "Pass-Through" and "Add" channels.
  • D、There is lower pass-through loss using multi-channel OADMs.
  • E、You can extract a single channel without dropping other channels.

正确答案:A,B

第6题:

It is important to learn to communicate.

A:minor
B:crucial
C:impossible
D:effective

答案:B
解析:
本题考查的是对形容词的认知。这句话的意思是:学会沟通是非常重要的。important的意思是重要的。选项A minor较少的,次要的。选项B crucial关键的,非常重要,例如:These negotiations are crucial to the future of our firm.这次谈判对我们公司的未来很重要。选项C impossible不可能的。选项D effective有效的。important和crucial 意思最接近,所以选B。

第7题:

What are two important guidelines to follow when implementing VTP?()

  • A、 CDPmust be enabled on all switches in theVTP management domain.
  • B、 All switches in the VTPdomain must run the same version of VTP.
  • C、 When using secure mode VTP, only configure management domain passwords onVTP servers.
  • D、 EnablingVTP pruning on a server willenable the feature for the entire management domain.
  • E、 Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.

正确答案:B,D

第8题:

A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()

A. operator training

B. cache size of the two clusters

C. fibre bandwidth capability between the sites

D. number of stacked tape drives attached to each cluster


参考答案:C

第9题:

When one connection to a host fails in a full mesh network, which of the following is true?()

  • A、All hosts can communicate.
  • B、No hosts can communicate.
  • C、Half of the hosts will lose communication.
  • D、Only the two hosts between the failed connection will lose communication.

正确答案:A

第10题:

In an Ethernet network, under what two scenarios can devices transmit?()

  • A、when they receive a special token
  • B、when there is a carrier
  • C、when they detect no other devices are sending
  • D、when the medium is idle
  • E、when the server grants access

正确答案:C,D

更多相关问题