Vulnerability assessment
Imaging software
Patch management
Configuration baseline
第1题:
第2题:
Which of the following best defines the Cisco Lifecycle Services approach()
第3题:
A. Incident response
B. Asset management
C. Patch management
D. Policies and procedures
第4题:
Which of the following specifies a set of consistent requirements for a workstation or server?()
第5题:
Which of the following should an administrator do after running a command from the console onthe perimeter router?()
第6题:
Which of the following three service requirements are included in the Cisco UnifiedCommunications optimize phase()
第7题:
You need to design a method to monitor the security configuration of the IIS server to meet the requirements in the written security policy. What should you do?()
第8题:
A. Ping sweep
B. Intrusion detection software
C. Port scanner
D. Wireless packet sniffer
第9题:
Which of the following monitors a server to see which protocols might be in use?()
第10题:
The company has two thousand servers located around the globe. Which of the following is the BEST method of patch management and deployment?()