AllExam Dumps

DUMPS, FREE DUMPS, VCP5 DUMPS| VMWARE DUMPS, VCP DUMPS, VCP4 DUMPS, VCAP DUMPS, VCDX DUMPS, CISCO DUMPS, CCNA, CCNA DUMPS, CCNP DUMPS, CCIE DUMPS, ITIL, EXIN DUMPS,


READ Free Dumps For
Warning: Undefined variable $vendor in /home1/bandbozu/getfreedumps.com/quiz.php on line 141
-
Warning: Undefined variable $exam_number in /home1/bandbozu/getfreedumps.com/quiz.php on line 141





Question ID 16887

Relationships among security technologies are BEST defined through which of the
following?

Option A

Security metrics

Option B

Network topology

Option C

Security architecture

Option D

 Process improvement models

Correct Answer C
Explanation Explanation: Security architecture explains the use and relationships of security mechanisms. Security metrics measure improvement within the security practice but do not explain the use and relationships of security technologies. Process improvement models and network topology diagrams also do not describe the use and relationships of these technologies.


Question ID 16888

In order to highlight to management the importance of network security, the security
manager should FIRST:

Option A

develop a security architecture.

Option B

 install a network intrusion detection system (NIDS) and prepare a list of attacks.

Option C

develop a network security policy.

Option D

conduct a risk assessment.

Correct Answer D
Explanation Explanation: A risk assessment would be most helpful to management in understanding at a very high level the threats, probabilities and existing controls. Developing a security architecture, installing a network intrusion detection system (NIDS) and preparing a list of attacks on the network and developing a network security policy would not be as effective in highlighting the importance to management and would follow only after performing a risk assessment.

Send email to admin@getfreedumps for new dumps request!!!