A.Strategic security planning B.Disaster recovery C.Implementation security D.Operations security
单项选择题WhichoneofthefollowingcommandscanbeusedtoenableAAAauthenticationtodetermineifausercanaccesstheprivilegecommandlevel?()
A.aaa authentication enable method default B.aaa authentication enable default C.aaa authentication enable level D.aaa authentication enable default local
单项选择题WhichtypeoffirewallisneededtoopenappropriateUDPportsrequiredforRTPstreams?()
A.Stateful firewall B.Proxy firewall C.Packet filtering firewall D.Stateless firewall
单项选择题Forthefollowingstatements,whichoneisperceivedasadrawbackofimplementingFibreChannelAuthenticationProtocol(FCAP)?()
A.It is restricted in size to only three segments B.It requires the use of netBT as the network protocol C.It requires the implementation of IKE D.It relies on an underlying Public Key Infrastructure
单项选择题Whichfirewallbestpracticescanhelpmitigatewormandotherautomatedattacks?()
A.Segment security zones B.Restrict access to firewalls C.Use logs and alerts D.Set connection limits
单项选择题Whichoneisthemostimportantbasedonthefollowingcommonelementsofanetworkdesign?()
A.Business needs B.Risk analysis C.Security policy D.Best practices