itgle.com

What is a primary objective of the security architecture assessment? ()A. document power and UPS availabilityB. to integrate routing and switching componentsC. create a design specification documentD. document the customer‘s current and future technology

题目
What is a primary objective of the security architecture assessment? ()

A. document power and UPS availability

B. to integrate routing and switching components

C. create a design specification document

D. document the customer‘s current and future technology projects


相似考题
更多“What is a primary objective of the security architecture assessment? () ”相关问题
  • 第1题:

    ( )is not included in Information Security Risk Assessment Process.

    A.Establishing information security risk criteria
    B.Identifying the information security risks
    C.Formulating an information security risk treatment plan
    D.Analysing the information security risk

    答案:A
    解析:
    信息安全风险评估过程不包括建立信息安全风险准则。

  • 第2题:

    Which of the following wireless service components occur in the implement phase?()

    • A、project kickoff,staging,systems acceptance testing,ongoing support handoff meeting
    • B、wlan change management,security administration,technology assessment,operations plan
    • C、security assessment,operations assessment,supplier management
    • D、operations readiness assessment,systems requirements validation,planning project kickoff,service assurance

    正确答案:A

  • 第3题:

    What is the goal of the borderless network architecture?()

    • A、to provide users with A single device that permits access to information anywhere
    • B、to provide users with the same productivity and access to information no matter where are or which device they use
    • C、to eliminate the need for border security and firewalls
    • D、to provide companies with A way to extend their security and control over employees on the internet

    正确答案:B

  • 第4题:

    What are three primary activities in the cycle of building an enterprise security strategy?()

    • A、activity audit
    • B、administration
    • C、policy establishment
    • D、technology implementation

    正确答案:A,C,D

  • 第5题:

    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()

    • A、Microsoft Baseline Security Analyzer (MBSA)
    • B、Microsoft Security Assessment Tool (MSAT)
    • C、Resultant Set of Policy (RSoP)
    • D、Security Configuration Wizard (SCW)

    正确答案:A

  • 第6题:

    多选题
    What are four benefits of recommended basic architecture?()
    A

    Good load balancing between Presentation Tier and Object Tier

    B

    Easy administration

    C

    Flexible Load balancing

    D

    Optimal performance

    E

    Simple security


    正确答案: B,A
    解析: 暂无解析

  • 第7题:

    单选题
    () means the person designated by the Company for ensuring that a ship security assessment is carried out; that a ship security plan is developed, submitted for approval, and thereafter implemented and maintained and for liaison with port facility security officers and the ship security officer.
    A

    Ship security officer

    B

    Company security officer

    C

    Port facility security officer

    D

    PSC officer


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    What is the goal of the borderless network architecture?()
    A

    to provide users withA single device that permits access to information anywhere

    B

    to provide users with the same productivity and access to information no matter where are or which device they use

    C

    to eliminate the need for border security and firewalls

    D

    to provide companies withA way to extend their security and control over employees on the internet


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    Which of the following wireless service components occur in the implement phase?()
    A

    project kickoff,staging,systems acceptance testing,ongoing support handoff meeting

    B

    wlan change management,security administration,technology assessment,operations plan

    C

    security assessment,operations assessment,supplier management

    D

    operations readiness assessment,systems requirements validation,planning project kickoff,service assurance


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    What is the primary objective of the plan phase()
    A

    Assess the existing environments to determine if it can support the proposed system.

    B

    Identify the activities for installing and configuring the equipment at the customer sites.

    C

    Gather high-level solution requirements, and understand the customer business needs an the opportunity.

    D

    Prepare the activities for day-to-day support, management, and monitoring of the newly implemented system.


    正确答案: A
    解析: 暂无解析

  • 第11题:

    多选题
    What are two components of the Junos software architecture? ()(Choose two.)
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    单选题
    What is the goal of the borderless network architecture?()
    A

    to provide users with A single device that permits access to information anywhere

    B

    to provide users with the same productivity and access to information no matter where are or which device they use

    C

    to eliminate the need for border security and firewalls

    D

    to provide companies with A way to extend their security and control over employees on the internet


    正确答案: D
    解析: 暂无解析

  • 第13题:

    What is a primary objective of the security architecture assessment? ()

    • A、document power and UPS availability
    • B、to integrate routing and switching components
    • C、create a design specification document
    • D、document the customer's current and future technology projects

    正确答案:B

  • 第14题:

    As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()

    • A、Create a design specification document.
    • B、Integrate routing and switching components.
    • C、Document power and UPS availability
    • D、Document the customer's current and future technology projects.

    正确答案:B

  • 第15题:

    What is the goal of the borderless network architecture?()

    • A、to provide users withA single device that permits access to information anywhere
    • B、to provide users with the same productivity and access to information no matter where are or which device they use
    • C、to eliminate the need for border security and firewalls
    • D、to provide companies withA way to extend their security and control over employees on the internet

    正确答案:B

  • 第16题:

    What is the primary purpose of the Technical and Delivery Assessment (TDA)?()

    • A、Identify, assess, and mitigate technical risks.
    • B、Verify pricing and gather components for special bid submission.
    • C、Verify the proposed solution will fit within the customer's budget.
    • D、Review competitive offerings, system performance and delivery schedules.

    正确答案:A

  • 第17题:

    单选题
    What must be updated regularly to detect the newest versions of personal firewalls on endpoints? ()
    A

    Infranet Enforcer firmware

    B

    Infranet Controller rollback software

    C

    Host Security Assessment Plug-in (HSAP)

    D

    Endpoint Security Assessment Plug-in (ESAP)


    正确答案: B
    解析: 暂无解析

  • 第18题:

    单选题
    You need to ensure that all servers meet the company’s security requirements. Which tool should you use?()
    A

    Microsoft Baseline Security Analyzer (MBSA)

    B

    Microsoft Security Assessment Tool (MSAT)

    C

    Resultant Set of Policy (RSoP)

    D

    Security Configuration Wizard (SCW)


    正确答案: B
    解析: 暂无解析

  • 第19题:

    单选题
    What is the objective of Diffie-Hellman?()
    A

    used to verify the identity of the peer

    B

    used between the initiator and the responder to establish a basic security policy

    C

    used to establish a symmetric shared key via a public key exchange process

    D

    used for asymmetric public key encryption


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    What is a primary objective of the security architecture assessment? ()
    A

    document power and UPS availability

    B

    to integrate routing and switching components

    C

    create a design specification document

    D

    document the customer's current and future technology projects


    正确答案: C
    解析: 暂无解析

  • 第21题:

    单选题
    The ship security assessment is an essential and integral part of the process of developing and updating()
    A

    the ship security plan

    B

    the company security plan

    C

    the port security plan

    D

    the national security plan


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    What are two components of the JUNOS Software architecture?()
    A

    Linux kernel

    B

    routing protocol daemon

    C

    session-based forwarding module

    D

    separate routing and security planes


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    单选题
    What is one key objective of the operations readiness assessment performed in the plan phase?Select exactly 1 answer(s) from the following:()。
    A

    align business requirements with technical requirements

    B

    create a plan to recycle used equipment

    C

    evaluate the readiness of a customers current operations and network management infrastructure to support a new technology

    D

    install and test system components in a non-production environment


    正确答案: A
    解析: 暂无解析