A. a minimum of one Cisco 4100 Series WLAN Controller
B. one WDS per subnet
C. a minimum of one Wireless LAN Services Module
D. all clients using Cisco Aironet Wireless LAN Adapters
您可能感興趣的試卷
你可能感興趣的試題
A. Cisco Bug Toolkit
B. Cisco Bug Matrix
C. Cisco.com Search functionality
D. Dynamic Configuration Tool
A. The Cisco Easy VPN Server feature and the Cisco software VPN client use the same GUI configuration tool to simplify remote-access VPN configurations.
B. The Cisco Easy VPN Server feature allows the Cisco software VPN client to receive its security policies from the central site VPN device. This minimizes the configuration requirements at the remote location for large remote access VPN deployments.
C. The Cisco Easy VPN Server feature and the Cisco software VPN client use hardware-based encryption to reduce the CPU overhead of the central site VPN router.
D. The Cisco Easy VPN Server feature and the Cisco software VPN client enable scalable remote-access VPNs deployment by using a thick client/thin server model where the central site VPN router can handle thousands of incoming VPN connections.
A. Advanced Correlation Engine
B. Advanced Notification Engine
C. CiscoWorks Dashboard
D. Management Center for CSA
A. AirDefense for wireless IDS is required by autonomous APs.
B. 2.40Hz CK management can monitor both 802.11 and non-802.11 CK interference.
C. APs only monitor the RF channels that are servicing the clients.
D. Cisco or CCX compatible client cards can extend the CK IDS service for autonomous APs.
E. Autonomous APs must be dedicated IDS sensors while lightweight APs can combine client traffic and RF monitoring.
A. 48 Ethernet 10/100 ports
B. Fast Ethernet and Gigabit Ethernet connectivity
C. dual-purpose copper or fiber uplinks
D. standalone fixed-configuration Layer 2 switching
A. security contexts
B.- transparent firewall
C. WebVPN
D. Active/Active failover
E. low latency queuing
F. AIP-SSM intrusion prevention
A. the large enterprise with a global presence
B. the large enterprise with a single campus
C. the small- or medium-sized business
D. All companies, regardless of size
Which two methods enable a PC connected to the PartnerNet to connect to a server on DMZ1 but deny it access to both DMZ2 and the Inside network? (Choose two.)()
A. Enable port address translation for traffic sourced from the PartnerNet PC to the DMZ1 server.
B. Disable NAT control on DM72 and the Inside interfaces only.
C. Enable static NAT translation for the DMZ1 server, and then use an ACL to permit the PartnerNet PC traffic to the DMZ1 server.
D. Disable NAT control on the DMZ1 interface only.
E. Lower the security level of the DMZ2 interface to 30.
F. Raise the security level of the PartnerNet interface to 55.
A. 10.0.0.0/24
B. 10.0.0.0/16
C. 10.0.0.0/14
D. 10.0.0.0/15
A. CiscoView
B. Resource Manager Essentials
C. Device Fault Manager
D. Campus Manager
最新試題
A company wants to connect two new offices to their main office.One building is 2 miles away from the headquarters and the other is 12 miles away. The angle between the buildings is 80 degrees. Which antenna is the best to use in this situation? ()
What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()
Which two of these are correct regarding access control lists? (Choose two.) ()
Which two of these statements describe important aspects of performing a wireless site survey? (Choose two.) ()
The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()
Which item is a feature of Cisco Compatible Extensions, Version 3? ()
Which of these statements regarding Cisco’s WebVPN support is correct?()
A customer needs approximately 15 to 20 wireless APs for RF coverage. Given that the customer is going to use the 1010 light weight AP with the advanced feature set, what other product is required to complete this operational functionality? ()
Which two of these statements best describe fast secure roaming? (Choose two.)()
Cisco ASDM provides 16 different graphs the help identify security risks by displaying data aboutpotentially malicious activity. What is one kind of data these graphs show? ()