单项选择题
What is needed to verify that a newly implemented security solution is performing as expected? ()
A.a detailed physical and logical topology
B.a cost analysis of the implemented solution
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution
相关考题
-
单项选择题
Whatactionshouldyoubepreparedtotakewhenverifyingasecuritysolution?()
A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system -
多项选择题
Whencreatinganetworksecuritysolution,whichtwopiecesofinformationshouldyouhavepreviouslyobtainedtoassistindesigningthesolution?()
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates -
多项选择题
Whichtwocomponentsshouldbepartofasecurityimplementationplan?()
A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
