The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy (Choose two.)()。
第1题:
A. host security
B. perimeter security
C. security monitoring
D. policy management
第2题:
A network vulnerability scanner is part of which critical element of network and system security?()
第3题:
A、network configuration
B、host systems
C、routers
D、softwares
第4题:
You are the administrator of your company’s network. Ten Windows 2000 Professional computers are located in the Research department. The computers contain highly confidential information. You want the 10 computers to be able to communicate with other Windows 2000 Professional computers on the network. However, you do not want them to communicate with computers that are not running Windows 2000, including those that are running Windows 95, Windows 98 and Windows NT. You want to configure a security policy on each computer to ensure that the confidential information is secure. What should you do?()
第5题:
Which two are needed components when designing and implementing a security solution?()
第6题:
What would you use to enforce security-policy compliance on all devices that seek to access the network?()
第7题:
The network security policy requires that only one host be permitted to attach dynamically to each switch interface. If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy?()
第8题:
A. Network diagram
B. Performance baseline
C. Network security procedure
D. Company policy
第9题:
Which of the following documents should always be kept up-to-date after any major changes aremade to a network backbone?()
第10题:
You have a combined Windows 2000 and Windows 98 network that contain sensitive data. You want to utilize as many new Windows 2000 security features as possible. You want to customize a security policy on each computer to ensure that data is kept confidential and secured. Allcomputers must still be able to communicate with each other over the network. What should you do?()