itgle.com

NAC's(Network Access Control)role is to restrict network access to only compliant endpoints and(请作答此空)users.However,NAC is not a complete LAN( )solution;additional proactive and( )security measures must be implemented,Nevis is the first and only comprehen

题目
NAC's(Network Access Control)role is to restrict network access to only compliant endpoints and(请作答此空)users.However,NAC is not a complete LAN( )solution;additional proactive and( )security measures must be implemented,Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps,ensuring a high level of security plus application availability and performance.Nevis integrates NAC as the first line of LAN security( ).In addition to NAC,enterprises need to implement role-based network access control as well as critical proactive security measures—real-time,multilevel( )inspection and microsecond threat containment.

A.automated
B.distinguished
C.authenticated
D.destructed

相似考题
更多“NAC's(Network Access Control)role is to restrict network access to only compliant endpoints and(请作答此空)users.However,NAC is not a complete LAN( )solution;additional proactive and( )security measures m”相关问题
  • 第1题:

    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。

    A.Allow unrestricted access to the console or VTY ports

    B.Use a firewall to restrict access from the outside to the network devices

    C.Always use Telnet to access the device command line because its data is automatically encrypted

    D.Use SSH or another encrypted and authenticated transport to access device configurations

    E.Prevent the loss of passwords by disabling password encryption


    参考答案:B, D

  • 第2题:

    NAC's (Network Access Control) role is to restrict network access to only compliant endpoints and ( )users. However, NAC is not a complete LAN(请作答此空)solution; additional proactive and ( )security measures must be implemented, Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security( ). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures—real-time, multilevel( )inspection and microsecond threat containment.

    A.crisis
    B.security
    C.favorable]
    D.excellent

    答案:B
    解析:
    网络访问控制(NAC)的作用是限制对网络的访问,只允许注册的终端和认证的用户访问网络。然而NAC,不是一个完整的LAN安全解决方案,另外还要实现主动的和被动的安全手段。Nevis是第一个也是仅有的全面的LAN安全解决方案,它以10Gbps的速率对每一个分组进行深度的安全处理,在提供高级别安全的同时能保证网络应用的可利用性和适当的性能。Nevis集成了NAC作为LAN的第一道安全防线。此外,企业还需要实现基于角色的网络访问控制,以及起关键作用的主动安全测试——实时的多级安全威胁检测和微秒级的安全威胁堵截。集中的安全策略配置、管理和报告使其能够迅速地对问题进行分析,对用户的活动进行跟踪,这些都是实时可见的,也是历史可查的。

  • 第3题:

    Network security consists of policies and practices to prevent and monitor( )access,misuse,modification, or denial of a computer network and network-accessible resources.Network security involves the authorization of access to data in a network,which is controlled by the network( ). Users choose or are assigned an ID and password or other authenticating information that allows them to access to information and programs within their authority.Network security secures the network,as well as protecting and overseeing operations being done. The most common and simple way of protecting a network resource is by assigning it a(请作答此空)name and a corresponding password. Network security starts with authentication.Once authenticated a ( ) enforces policies such as what services are allowed to be accessed by the network users. Though effective to prevent unauthorized access, this component may fail to check potentially harmful content such as computer( )or Trojans being transmitted over the network

    A.complex
    B.unique
    C.catchy
    D.long

    答案:B
    解析:
    网络安全概念。

  • 第4题:

    Which two actions, when taken in combination, will result in an effective network security solution?()

    • A、 develop a policy for securing the network
    • B、 monitor and test network activities for vulnerabilities
    • C、 implement reflexive access lists
    • D、 implement dynamic access lists
    • E、 select and implement a single comprehensive virus protection program

    正确答案:A,B

  • 第5题:

    Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

    • A、NAC can authenticate using 802.1X and IBNS cannot
    • B、NAC can ensure only compliant machines connect and IBNS cannot
    • C、NAC can ensure access to the correct network resources and IBNS cannot
    • D、NAC can manage user mobility and reduce overhead costs and IBNS cannot

    正确答案:B

  • 第6题:

    Your network contains an Exchange Server 2010 server.  You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages  What should you include in the plan?()

    • A、Full Access and Send As permissions
    • B、Full Access and send on behalf of permissions
    • C、Role Based Access Control (RBAC) assignments and Send As permissions
    • D、Role Based Access Control (RBAC) assignments and send on behalf of permissions

    正确答案:A

  • 第7题:

    单选题
    You are designing a security strategy for users who need remote access to the corporate network.  What should you do?()
    A

     Configure Internet Authentication Service (IAS) for accounting.

    B

     Configure the server running Routing and Remote Access to support L2TP.

    C

     Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.

    D

     Create a separate account for remote access users. Configure these accounts to access the NewApp server only.


    正确答案: A
    解析: 暂无解析

  • 第8题:

    多选题
    As the Company wireless administrator, you required to be knowledgeable about the wireless LAN  components.  Which two statements about these components are true? ()
    A

    In the autonomous access point solution, control is provided by the WLAN controller.

    B

    In the lightweight access point solution, WLAN management is provided by the WLAN Control  System (WCS).

    C

    In the autonomous access point solution, control is provided by the WDS (Wireless Domain  Services).

    D

    Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless  Network.

    E

    Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution  Engine (WLSE).

    F

    Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless  Network.


    正确答案: B,C
    解析: 暂无解析

  • 第9题:

    单选题
    Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
    A

    NAC can authenticate using 802.1X and IBNS cannot

    B

    NAC can ensure only compliant machines connect and IBNS cannot

    C

    NAC can ensure access to the correct network resources and IBNS cannot

    D

    NAC can manage user mobility and reduce overhead costs and IBNS cannot


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()
    A

    Source IP and browser

    B

    Source IP and certificate

    C

    Certificate and Host Checker

    D

    Host Checker and source IP


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
    A

     NAC can authenticate using 802.1X and IBNS cannot

    B

     NAC can ensure only compliant machines connect and IBNS cannot

    C

     NAC can ensure access to the correct network resources and IBNS cannot

    D

     NAC can manage user mobility and reduce overhead costs and IBNS cannot


    正确答案: B
    解析: 暂无解析

  • 第12题:

    多选题
    pany is deploying a Cisco autonomous WLAN solution in their network.  Which three  components are included in this solution?()
    A

    Wireless Domain Services (WDS)

    B

    Access Control Server (ACS)

    C

    Lightweight Access Point Protocol (LWAPP)

    D

    Wireless LAN solution Engine (WLSE)

    E

    Wireless Services Module (WISM)

    F

    Wireless Control System (WCS)


    正确答案: C,F
    解析: 暂无解析

  • 第13题:

    In the fields of physical security and information security, access control is the selective restriction of access to a place or other resource. The act of accessing may mean consuming,entering, or using. Permission to access a resource is called authorization(授权).An access control mechanism( )between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls; routers, files,and databases. The system must first authenticate(验证)a user seeking access. Typically the authentication function determines whether the user is ( ) to access the system at all.Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to( ) access. An auditing function monitors and keeps a record of user accesses to system resources.In practice, a number of(请作答此空)may cooperatively share the access control function. All Operating systems have at least a rudimentary(基本的).and in many cases a quite robust, access control component. Add-on security packages can add to the ( )access control capabilities of the OS. Particular applications .or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services .

    A.components
    B.users
    C.mechanisms
    D.algorithms

    答案:A
    解析:
    在物理安全和信息安全领域,访问控制是访问一个地方或其他资源的选择性限制。访问的行为可能是消耗、进入或使用。访问资源的权限称为授权。访问控制机制介于用户(或代表用户的过程的执行)和系统资源之间,资源如应用程序、操作系统、防火墙、路由器、文件和数据库。系统必须首先认证用户的访问企图。典型的,认证功能确定一个用户是否被允许访问该系统。然后,访问控制功能确造此用户的特定访问请求是否允许。安全管理员维护授权数据库,其中指定用户可以访问对那个资源具有什么类型的访问权限。访问控制功能查询数据库以确定是否授权访问。审计功能监控和记录用户对系统资源的访问。实际上,很多组件可以一起合作提供访问控制功能。所有操作系统至少具有基本的访问控制组件,而且这些组件大多情况下非常健壮。附加安全包可以添加到操作系统的本地安全控制功能。特定的应用和实用工具,如数据管理系统,也并入了访问控制功能。如防火墙等外部设备也能够提供访问控制服务。

  • 第14题:

    NAC's (Network Access Control) role is to restrict network access to only compliant endpoints and (请作答此空)users. However, NAC is not a complete LAN( )solution; additional proactive and ( )security measures must be implemented, Nevis is the first and only comprehensive LAN security solution that combines deep security processing of every packet at 10Gbps, ensuring a high level of security plus application availability and performance. Nevis integrates NAC as the first line of LAN security( ). In addition to NAC, enterprises need to implement role-based network access control as well as critical proactive security measures—real-time, multilevel( )inspection and microsecond threat containment.

    A.automated]
    B.distinguished]
    C.authenticated]
    D.destructed]

    答案:C
    解析:
    网络访问控制(NAC)的作用是限制对网络的访问,只允许注册的终端和认证的用户访问网络。然而NAC,不是一个完整的LAN安全解决方案,另外还要实现主动的和被动的安全手段。Nevis是第一个也是仅有的全面的LAN安全解决方案,它以10Gbps的速率对每一个分组进行深度的安全处理,在提供高级别安全的同时能保证网络应用的可利用性和适当的性能。Nevis集成了NAC作为LAN的第一道安全防线。此外,企业还需要实现基于角色的网络访问控制,以及起关键作用的主动安全测试——实时的多级安全威胁检测和微秒级的安全威胁堵截。集中的安全策略配置、管理和报告使其能够迅速地对问题进行分析,对用户的活动进行跟踪,这些都是实时可见的,也是历史可查的。

  • 第15题:

    pany is deploying a Cisco autonomous WLAN solution in their network.  Which three  components are included in this solution?()

    • A、 Wireless Domain Services (WDS)
    • B、 Access Control Server (ACS)
    • C、 Lightweight Access Point Protocol (LWAPP)
    • D、 Wireless LAN solution Engine (WLSE)
    • E、 Wireless Services Module (WISM)
    • F、 Wireless Control System (WCS)

    正确答案:A,B,D

  • 第16题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第17题:

    Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()

    • A、It can be used to allow the access privilege settings for users but not roles.
    • B、It can be used to allow the access privilege settings for users as well as roles.
    • C、It can be used to control the time interval for which the access privilege is available to a user.
    • D、It can be used to selectively restrict the access for each user in a database to different host computers.
    • E、It can be used to selectively restrict a user's access to different applications in a specific host computer.

    正确答案:B,C,D

  • 第18题:

    You are designing a security strategy for users who need remote access to the corporate network. What should you do?()

    • A、Configure Internet Authentication Service (IAS) for accounting.
    • B、Configure the server running Routing and Remote Access to support L2TP.
    • C、Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.
    • D、Create a separate account for remote access users. Configure these accounts to access the NewApp server only.

    正确答案:C

  • 第19题:

    多选题
    Which two actions, when taken in combination, will result in an effective network security solution?()
    A

    develop a policy for securing the network

    B

    monitor and test network activities for vulnerabilities

    C

    implement reflexive access lists

    D

    implement dynamic access lists

    E

    select and implement a single comprehensive virus protection program


    正确答案: A,B
    解析: 暂无解析

  • 第20题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: E,D
    解析: 暂无解析

  • 第21题:

    多选题
    You want to restrict access to a role based on the client machine from which the user is accessing the network.Which two role restrictions accomplish this goal? ()
    A

    user name

    B

    password length

    C

    certificate

    D

    Host Checker


    正确答案: A,B
    解析: 暂无解析

  • 第22题:

    多选题
    Which two considerations must you take into account when deploying a Junos Pulse Access Control Service cluster?()
    A

    State synchronization occurs only through the internal network interface card (NIC)

    B

    Latency of the WAN must be less than 300 ms.

    C

    Authenticating endpoints must be on the same LAN segment.

    D

    Cluster members must use the same hardware platfor


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    单选题
    You need to design a method to protect traffic on the wireless network. Your solution must meet the requirements of the chief security officer. What should you do?()
    A

    Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses

    B

    Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use

    C

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks

    D

    Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks


    正确答案: D
    解析: 暂无解析