A.Segment security zones B.Restrict access to firewalls C.Use logs and alerts D.Set connection limits
单项选择题Whichoneisthemostimportantbasedonthefollowingcommonelementsofanetworkdesign?()
A.Business needs B.Risk analysis C.Security policy D.Best practices
单项选择题WhichPublicKeyCryptographicStandards(PKCS)definesthesyntaxforencryptedmessagesandmessageswithdigitalsignatures?()
A.PKCS #7 B.PKCS #8 C.PKCS #10 D.PKCS #12
单项选择题Examinethefollowingoptions,whichSpanningTreeProtocol(STP)protectionmechanismdisablesaswitchportiftheportreceivesaBridgeProtocolDataUnit(BPDU)?()
A.Uplink Fast B.Port Fast C.BPDU Guard D.Root Guard
多项选择题Observethefollowingoptionscarefully,whichtwoattacksfocusonRSA?()
A.BPA attack B.Adaptive chosen ciphertext attack C.DDoS attack D.Man-in-the-middle attack
单项选择题Whatisthepurposeofthesecureboot-configglobalconfiguration?()
A.takes a snapshot of the router running configuration and securely archives it in persistent storage B.stores a secured copy of the Cisco IOS image in its persistent storage C.backs up the Cisco IOS image from flash to a TFTP server D.enables Cisco IOS image resilience