A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
您可能感興趣的試卷
你可能感興趣的試題
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates
A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
A.detailed VLAN information
B.an incident response plan
C.results of testing the new network configuration
D.an existing hierarchical network topology
E.a security policy for your organization
You are tasked with designing a security solution for your network.
What information should be gathered prior to designing the solution?()
A.a list of applications currently in use in the network
B.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
C.detailed security device specifications
D.results from pilot network testing
You are tasked with designing a security solution for your network.
What information should be gathered prior to designing the solution?()
A.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
B.detailed security device specifications
C.results from pilot network testing
D.results from a network audit
最新試題
Which two statements are true about BPDU port-guard and BPDU filtering?()
Refer to the exhibit. Based on the output of the show spanning-tree command, which statement is true? ()
Which two statements are true when the extended system ID feature is enabled? ()
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()
Which router redundancy protocol cannot be configured for interface tracking?()
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Which option correctly identifies the Cisco IOS switching methods in descending order from the fastest method to the slowest method?()
Which statement is correct about the use of the virtual interface on a WLC ?()