Cisco 642-565 题库分享

本文提供Cisco安全解决方案考试(642-565)的相关题目及答案解析,涵盖Cisco Security Agent的功能、安全方案设计要素等内容,并涉及了认证、内容控制、资源保护等关键主题。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

 

Cisco® Security Solutions for Systems Engineers(SSSE)

  • 642-565 科目编号:642-565
  • 642-565 科目名称:Cisco® Security Solutions for Systems Engineers(SSSE)
  • 642-565 考题数目:70 Q&As
  • 642-565 更新日期:2009-11-06

 
 
Exam  :  Cisco 642-565
Title    :  Cisco(r) Security Solutions for Systems Engineers(SSSE)


1. Drag and Drop
Answer:

2. What are two functions of Cisco Security Agent? (Choose two.)
A. authentication
B. control of executable content
C. resource protection
D. spam filtering
E. user tracking
Answer: BC

3. Which two components should be included in a detailed design document for a security solution? (Choose two.)
A. data source
B. existing network infrastructure
C. organizational chart
D. proof of concept
E. traffic growth forecast
F. weak-link description
Answer: BD

4. What are three functions of CSA in helping to secure customer environments? (Choose three.)
A. application control
B. control of executable content
C. identification of vulnerabilities
D. probing of systems for compliance
E. real-time analysis of network traffic
F. system hardening
Answer: ABF

5. Which three technologies address ISO 17799 requirements for unauthorized access prevention? (Choose three.)
A. Cisco Secure Access Control Server
B. SSL VPN
C. 802.1X
D. Network Admission Control
E. Cisco Security MARS
F. intrusion prevention system
Answer: ACD

6. Which two of these features are key elements of the collaborative security approach? (Choose two.)
A. integration of security features in network equipment
B. Network Admission Control
C. coordinated defense of potential entry points
D. automated event and action filters
E. network behavioral analysis
F. device chaining
Answer: BC

7. Which three policy types can be assigned to a network user role in the Cisco NAC Appliance architecture? (Choose three.)
A. allowed IP address ranges
B. session duration
C. minimum password length
D. VPN and roaming policies
E. inactivity period
F. network port scanning plug-ins
Answer: BDF

8. Which of these items is a valid method to verify a network security design?
A. network audit
B. sign-off by the operations team
C. computer simulation
D. analysis of earlier attacks
E. pilot or prototype network
Answer: E

9. Which certificates are needed for a device to join a certificate-authenticated network?
A. the certificates of the certificate authority and the device
B. the certificates of the device and its peer
C. the certificates of the certificate authority and the peer
D. the certificates of the certificate authority, the device, and the peer
Answer: A

10. SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information. They are planning to use RSA to ensure data privacy, integrity, and origin authentication. Which two of these statements describe features of the RSA keys? (Choose two.)
A. The public key only encrypts.
B. The public key only decrypts.
C. The public key both encrypts and decrypts.
D. The private key only encrypts.
E. The private key only decrypts.
F. The private key both encrypts and decrypts.
Answer: CF

 

更多内容可以看这里

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值