CCNA系列认证

单选题What should be part of a comprehensive network security plan?()A Allow users to develop their own approach to network security.B Physically secure network equipment from potential access by unauthorized individuals.C Encourage users to use personal inf

题目
单选题
What should be part of a comprehensive network security plan?()
A

Allow users to develop their own approach to network security.

B

Physically secure network equipment from potential access by unauthorized individuals.

C

Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.

D

Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.

E

Minimize network overhead by deactivating automatic antivirus client updates.

参考答案和解析
正确答案: E
解析: 暂无解析
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A network vulnerability scanner is part of which critical element of network and system security?()

A. host security

B. perimeter security

C. security monitoring

D. policy management


参考答案:C

第2题:

材料:

Ships entering piracy risk areas must be aware of the risk of attack and should take appropriate measures to increase the level of surveillance(监督)and security on board and devise means of responding to attacks.A clear and comprehensive Ship Security Plan and the training of crews in security measures and response techniques are essential.Without clearly defined and rigorously practiced procedures,the risk of an uncoordinated response during the inevitable confusion of an attack increases the danger faced by those on board the ship.While a Ship Security Plan and crew training may not prevent an attack they should help reduce the risks if an attack takes place.

Attacks by pirates or armed robbers pose an immediate threat to the safety of a ship and individual crew members.When responding to attacks,masters and crews should seek to minimize the risk to those on board and maintain effective control over the safe navigation of the ship. Finally,it is important that all incidents of piracy and armed robbery,even minor incidents,are reported in detail to the appropriate authorities as soon as practicable.Accurate knowledge of the type and extent of piracy and armed robbery of ships is valuable for assessing the risk and formulating a comprehensive response.

问题:

The passage implies the following except ______.

A.Safety of lives onboard and the control of the safe navigation of the ship are the priority considerations when making decisions in responding to attacks

B.A clear and comprehensive Ship Security Plan can be developed by notifying the appropriate authorities of piracy-related information

C.The risk of an uncoordinated response during the inevitable confusion of an attack could be decreased by clearly defined and well practiced procedures

D.The communication of piracy-related information is a useful mechanism for anti-piracy Actions

Without clearly defined and rigorously practiced procedures,the risk of an uncoordinated response during the inevitable confusion of an attack increases the danger faced by those on board the ship.A.frequently

B.perioically

C.occasionally

D.strictly

Which of the following is not mentioned as the measures taken for anti-piracy ___________.A.Risk assessment and Ship Security Plan

B.security alarming system onboard

C.Practices of procedures

D.communication of piracy- or security- related information

Which of the following is correct according to the passage ___________.A.A Ship Security Plan can always define clear and comprehensive procedures

B.Rigorously practiced procedure can always prevent a piracy attack

C.A well-designed Ship Security Plan and the training of crews are significant for anti-piracy

D.A well-designed Ship Security Plan and the training of crews can always prevent the ship from being attacked

请帮忙给出每个问题的正确答案和分析,谢谢!


问题 1 答案解析:B


问题 2 答案解析:D


问题 3 答案解析:B


问题 4 答案解析:C

第3题:

One of the following is not a integral part of ship security plan.______.

A.Internal and external communication

B.Restricted areas

C.Access to ship

D.Non of the above


正确答案:D
下列的哪个不是保安计划的组成部分?以上都不是。

第4题:

You are tasked with designing a security solution for your network.  What information should be gathered prior to designing the solution?()

  • A、IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
  • B、a list of the customer requirements
  • C、detailed security device specifications
  • D、results from pilot network testing

正确答案:B

第5题:

What are the benefit of using Netflow?()

  • A、Network, Application & User Monitoring
  • B、Network Planning
  • C、Security Analysis
  • D、Accounting/Billing

正确答案:A,C

第6题:

What should be part of a comprehensive network security plan()。

A.Allow users to develop their own approach to network security

B.Physically secure network equipment from potential access by unauthorized individuals

C.Encourage users to use personal information in their passwords to minimize the likelihood of passwords being forgotten

D.Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported

E.Minimize network overhead by deactivating automatic antivirus client updates


参考答案:B

第7题:

During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()

  • A、Position
  • B、Prepare
  • C、Design
  • D、Perform
  • E、Plan

正确答案:E

第8题:

第三组:Following a security incident, in which the response measures outlined in the Ship Security Plan (SSP) have been activated, there will be a thorough review of their effectiveness and details will be made available, on request, to persons duly authorized by the Ship&39;s Flag State Administration. The Ship Security Plan is not subject to detailed inspection (other than confirming its existence on the ship) by duly authorized officials of a port State unless there are "clear grounds" to believe that the ship is not in compliance with the requirements of SOLAS or the ISPS Code, and the only means to verify or rectify the non-compliance is to review the relevant sections of the Plan. In such cases, access to the Restricted parts of the Plan relating to the non-compliance is exceptionally allowed, but only with the consent of the Flag State, or the master. If the master, in his professional judgment, believes that such "clear grounds" exist, and allowing access to relevant sections of the Restricted part of the Plan might resolve the situation, such access can be exceptionally granted. However, this should be immediately reported by the ship to the Company Security Officer (CSO). If access to the Restricted part of the Plan is denied by the master, this should be immediately reported by the ship to the Company Security Officer for guidance and reference to the Flag State.

The Confidential part of a SSP cannot be subject to non-flag State inspection unless otherwise agreed by the contracting governments concerned. Any such request or demand by port state officials to view sections of the Confidential part of the Plan will be immediately reported by the ship to the Company Security Officer for guidance and reference to the flag State before any details are revealed to non-flag State officials. The Confidential provisions, which from an integral part of this Plan, are held by the Ship Security Officer (SSO)

After a security incident, the revision of the SSP will made by____.

A.the CSO

B.the SSO

C.persons duly authorized by the Ship&39;s Flag State Administration

D.information not given


正确答案:C

第9题:

A network vulnerability scanner is part of which critical element of network and system security?()

  • A、host security
  • B、perimeter security
  • C、security monitoring
  • D、policy management

正确答案:C

第10题:

What should be part of a comprehensive network security plan?()

  • A、Allow users to develop their own approach to network security.
  • B、Physically secure network equipment from potential access by unauthorized individuals.
  • C、Encourage users to use personal information in their passwords to minimize the likelihood of passwords beingforgotten.
  • D、Delay deployment of software patches and updates until their effect on end-user equipment is well known and widely reported.
  • E、Minimize network overhead by deactivating automatic antivirus client updates.

正确答案:B

更多相关问题