A.Business needs B.Risk analysis C.Security policy D.Best practices
单项选择题WhichPublicKeyCryptographicStandards(PKCS)definesthesyntaxforencryptedmessagesandmessageswithdigitalsignatures?()
A.PKCS #7 B.PKCS #8 C.PKCS #10 D.PKCS #12
单项选择题Examinethefollowingoptions,whichSpanningTreeProtocol(STP)protectionmechanismdisablesaswitchportiftheportreceivesaBridgeProtocolDataUnit(BPDU)?()
A.Uplink Fast B.Port Fast C.BPDU Guard D.Root Guard
多项选择题Observethefollowingoptionscarefully,whichtwoattacksfocusonRSA?()
A.BPA attack B.Adaptive chosen ciphertext attack C.DDoS attack D.Man-in-the-middle attack
单项选择题Whatisthepurposeofthesecureboot-configglobalconfiguration?()
A.takes a snapshot of the router running configuration and securely archives it in persistent storage B.stores a secured copy of the Cisco IOS image in its persistent storage C.backs up the Cisco IOS image from flash to a TFTP server D.enables Cisco IOS image resilience
多项选择题WithwhichthreetasksdoestheIPSPoliciesWizardhelpyou?()
A.Selecting the interface to which the IPS rule will be applied B.Selecting the Signature Definition File (SDF) that the router will use C.Selecting the direction of traffic that will be inspected D.Selecting the inspection policy that will be applied to the interface