2008年8月4日星期一

Pass4side 思科646-301 认证考题

1.Which three statements are true about Network IDS (NIDS)? (Choose three.)

A:NIDS is generally not impacted on the host.
B:NIDS can protect all hosts on a monitored network.
C:NIDS are often better at preventing specific attacks than Host IDS.
D:NIDS can detect network probes and Denial of Service (DoS) attacks.

E:NIDS requires that client software be installed on all hosts in the network Correct
Answers: A, B, C

2.A business has successfully included distributors in its intranet, and now wants to include suppliers and vendors. For intranet security, you recommend that they rely on _____.

A: the service provider’s Security Management
B: accurate and up-to-date access lists on all the edge routers
C: the security features in the applications the new users will be using
D: updating the security policy, using the Cisco SAFE guidelines for all elements Correct Answers: D

3.A customer is discussing the high cost of their leased lines as a rationale for not moving ahead with implementing a firewall solution. This is a good time to discuss _____.
A: leasing options for the firewall
B: how VPNs can save them money
C: promotions that will lower the cost of the firewall
D: how IDS can monitor their leased lines for threatsCorrect
Answers: B

4.Your account team is selling to a large, global company, that has many large manufacturing divisions, sales offices around the world, small subsidiaries, and medium businesses in many countries. The Cisco SAFE Blueprint can help your account team propose security solutions for the account’s _____.

A: subsidiaries
B: sales and branch offices
C: entire network and all sites
D: headquarters and large divisionsCorrect
Answers: C

5.What are three characteristics of the Cisco SAFE Blueprint? (Choose three.)
A:static
B:modular
C:
:theoreticalCorrect
Answers: B, C, D

6.How does Cisco Intrusion Protection address the issue of unauthorized access to critical sensitive data?

A: provides embedded device, multi-device and policy management control
B: reduces additional financial losses by shutting down the network on intrusions
C: enables the configuration of a Cisco IDS sensor using Command Line Interface (CLI)
D: supports corporate security policy by constantly validating, assessing, and reporting on the security status of all network components Correct
Answers: D

更多信息可登陆:http://51-test.cn/

没有评论: