2016年IBM认证考试试题及答案

来源:文书网 2.15W

  1.A client requests a GX5108CF demonstration. After receiving the GX5108CF and BYP-2T-2S-0L-P bypass unit, the client calls the SE and explains that the four segments in the network are copper running at 1GBPS. How should the SE respond?

2016年IBM认证考试试题及答案

nge for 2x (DUAL-TVR-KIT-TX-ROHS) transceiver kits and 1x (BYP-4T-0S-0L-P) bypass units.

nge for a Gx5108SFP with 4x (DUAL-TVR-KIT-LX-ROHS) transceiver kits.

nge for 4x (DUAL-TVR-KIT-TX-ROHS) transceiver kits (2 kits for NIPS and 2 kits for the bypass unit)。

nge for 4x (DUAL-TVR-KIT-TX-ROHS) transceiver kits and 1x (BYP-4T-0S-0L-P) bypass units.

Answer: A

   SE is accompanying the sales team to a sales presentation. The sales team asks the SE to discuss commercial and open-source vulnerability scanning solutions. What content should the SE include?

erability scanning tools must be based on high-quality vulnerability research to be most effective.

ercial tools always check for more vulnerabilities than open source tools.

source tools might cause a denial of service during a scan, but commercial products never cause this problem.

ercial vulnerability scanning tools are faster than open source tools.

Answer: A

   would happen to traffic that matched a Proventia Network IPS Firewall rule with the action Protect?

would be dropped.

would go through the IDS signature policy.

would trigger alerts only and never be blocked.

would trigger a DNS lookup for the source IP address.

Answer: B

   general, a SiteProtector appliance would not be suitable for which type of environment?

e Enterprise

l Office

Alert Volume

ributed

Answer: B

   X-Force research and development team is primarily concerned with which of the following?

oits discovered on the internet

racted research

erability research at IBM ISS

T IDS signature standards

Answer: C


热门标签