A.Strategic security planning
B.Disaster recovery
C.Implementation security
D.Operations security
您可能感興趣的試卷
你可能感興趣的試題
A.aaa authentication enable method default
B.aaa authentication enable default
C.aaa authentication enable level
D.aaa authentication enable default local
A.Stateful firewall
B.Proxy firewall
C.Packet filtering firewall
D.Stateless firewall
A.It is restricted in size to only three segments
B.It requires the use of netBT as the network protocol
C.It requires the implementation of IKE
D.It relies on an underlying Public Key Infrastructure
A.Segment security zones
B.Restrict access to firewalls
C.Use logs and alerts
D.Set connection limits
A.Business needs
B.Risk analysis
C.Security policy
D.Best practices
最新試題
What are two characteristics of the SDM Security Audit wizard?()
When configuring role-based CLI on a Cisco router,which action will be taken first ?()
Which type of MAC address is dynamically learned by a switch port and then added to the switch’s runningconfiguration?()
Which information is stored in the stateful session flow table while using a stateful firewall?()
When using the Cisco SDM Quick Setup Siteto-Site VPN wizard, which three parameters do you configure?()
Which name is of the e-mail traffic monitoring service that underlies that architecture of IronPort?()
What is a static packet-filtering firewall used for ?()
A standard access control list has been configured on a router and applied to interface Serial 0 in anoutbound direction. No ACL is applied to Interface Serial 1 on the same router. What will happen whentraffic being filtered by the access list does not match the configured ACL statements for Serial 0?()
Which option ensures that data is not modified in transit?()
What is the objective of Diffie-Hellman?()