多項(xiàng)選擇題Which two of these are characteristics of an IDS sensor?()

A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network


您可能感興趣的試卷

你可能感興趣的試題

2.單項(xiàng)選擇題Which of these terms refers to call issues that cause variations in timing or time of arrival?()

A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio

3.多項(xiàng)選擇題

Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()

A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization

4.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

5.多項(xiàng)選擇題What are two design guidelines for VoIP networks? ()

A.Delay should be no more than 10 ms.
B.Loss should be no more than1 percent.
C.Jitter should be less then 40 ms.
D.Managed bandwidth is strongly recommended for voice control traffic.

6.多項(xiàng)選擇題Which three of these are elements of the Cisco Unified Wireless Network architecture?()

A.cell phones
B.remote access
C.mobility services
D.network management
E.network unification
F.network decentralization

8.單項(xiàng)選擇題Which of these Layer 2 access designs does not support VLAN extensions?()

A.FlexLinks
B.loop-free U
C.looped square
D.looped triangle
E.loop-free inverted U

10.多項(xiàng)選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

最新試題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項(xiàng)選擇題

Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

題型:單項(xiàng)選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:單項(xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()

題型:單項(xiàng)選擇題

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

題型:單項(xiàng)選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:單項(xiàng)選擇題

Which two of these are advantages of placing the VPN device parallel to the firewall?()

題型:多項(xiàng)選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項(xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:單項(xiàng)選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:單項(xiàng)選擇題