单项选择题
What action should you be prepared to take when verifying a security solution?()
A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
相关考题
-
多项选择题
Whencreatinganetworksecuritysolution,whichtwopiecesofinformationshouldyouhavepreviouslyobtainedtoassistindesigningthesolution?()
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates -
多项选择题
Whichtwocomponentsshouldbepartofasecurityimplementationplan?()
A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis -
多项选择题
Whichtwoareneededcomponentswhendesigningandimplementingasecuritysolution?()
A.detailed VLAN information
B.an incident response plan
C.results of testing the new network configuration
D.an existing hierarchical network topology
E.a security policy for your organization
