Pass 2017 Avaya 132-s-720–1 Certification Exam — Armenotype

by Mathew
January 5, 2017

132-s-720–1 Exam A QUESTION 1
Drop

A.
B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
QUESTION 2
SomeCompany, Ltd. wants to implement the the PCI Data Security Standard to protect sensitive cardholder information. They are planning to use RSA to ensure data privacy, integrity, and origin authentication. Which two of these statements describe features of the RSA keys? (Choose two.)
A. The public key only encrypts.
B. The public key only decrypts.
C. The public key both encrypts and decrypts.
D. The private key only encrypts.
E. The private key only decrypts.
F. The private key both encrypts and decrypts.

Correct Answer: CF Section: (none) Explanation
Explanation/Reference:
QUESTION 3
What are two functions of Cisco Security Agent? (Choose two.)
A. authentication
B. control of executable content
C. resource protection
D. spam filtering
E. user tracking

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 4
Which three policy types can be assigned to a network user role in the Cisco NAC Appliance architecture? (Choose three.)
A. allowed IP address ranges
B. session duration
C. minimum password length
D. VPN and roaming policies
E. inactivity period
F. network port scanning plug-ins

Correct Answer: BDF Section: (none) Explanation
Explanation/Reference:
QUESTION 5
Which of these items is a valid method to verify a network security design?
A. network audit
B. sign-off by the operations team
C. computer simulation
D. analysis of earlier attacks
E. pilot or prototype network

Correct Answer: E Section: (none) Explanation
Explanation/Reference:
QUESTION 6
Drop A.

B.
C.
D.

Correct Answer: Section: (none) Explanation
Explanation/Reference:
QUESTION 7
Which two components should be included in a detailed design document for a security solution? (Choose two.)
A. data source
B. existing network infrastructure
C. organizational chart
D. proof of concept
E. traffic growth forecast
F. weak-link description

Correct Answer: BD Section: (none) Explanation
Explanation/Reference:
QUESTION 8
What are three functions of CSA in helping to secure customer environments? (Choose three.)
A. application control
B. control of executable content
C. identification of vulnerabilities
D. probing of systems for compliance
E. real-time analysis of network traffic
F. system hardening

Correct Answer: ABF Section: (none) Explanation
Explanation/Reference:
QUESTION 9
Which two of these features are key elements of the collaborative security approach? (Choose two.)
A. integration of security features in network equipment
B. Network Admission Control
C. coordinated defense of potential entry points
D. automated event and action filters
E. network behavioral analysis
F. device chaining

Correct Answer: BC Section: (none) Explanation
Explanation/Reference:
QUESTION 10
Which two of these statements describe features of the NAC Appliance architecture. (Choose two.)
A. NAC Appliance Server evaluates the endpoint security information.
B. NAC Appliance Manager determines the appropriate access policy.
C. NAC Appliance Client acts as an authentication proxy for internal user authentication.
D. NAC Appliance Manager acts as an authentication proxy for external authentication servers.

Correct Answer: BD Section: (none) Explanation
132-s-720–1 Explanation/Reference:

Leave a Comment

NEWS

This Story was posted to the «News» Section.

News Home
News RSS Feed

FEATURES

This Story was posted to the «Features» Section.

Features Home
Features RSS Feed

» Next Story In this Section

How to Make Writing a Will Easy

Article writing is the best component universal kind of authorship. A Composition is thought as proper piece of…

« Previous Story in this Section

«Հայկական գրատպության սփյուռքը, 1512–2012»
«Հայկական գրատպության սփյուռքը, 1512–2012»
  • English
  • Հայերէն

An Armenian translation of a review –commissioned by the journal Codex– of John A. Lane’s book on the history of Armenian printing.