单项选择题
What is an important step to take when verifying a newly proposed network security solution? ()
A.Test the design on a pilot network for expected results prior to implementing on the production network.
B.Run a network audit to determine types of traffic in use on the network.
C.Launch campus updates into the production network and monitor impact to see if configuration changes are needed.
D.Create an interruption of data flow to determine test "back-door" access methods.
相关考题
-
单项选择题
Whatisneededtoverifythatanewlyimplementedsecuritysolutionisperformingasexpected?()
A.a detailed physical and logical topology
B.a cost analysis of the implemented solution
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution -
单项选择题
Whatactionshouldyoubepreparedtotakewhenverifyingasecuritysolution?()
A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system -
多项选择题
Whencreatinganetworksecuritysolution,whichtwopiecesofinformationshouldyouhavepreviouslyobtainedtoassistindesigningthesolution?()
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates
