A. host security
B. perimeter security
C. security monitoring
D. policy management
您可能感興趣的試卷
你可能感興趣的試題
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A.3
B.6
C.7
D.8
A. Router mode
B. One-arm mode
C. Three-arm mode
D. Bridge mode inline
A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
A.4
B.6
C.-67
D.10
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of the larger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved, even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.
A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.
Which two characteristics are true of a firewall running in routed mode based on the following information?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.
A. dial plans
B. dialed numbers
C. voice mail prompts
D. phone features
最新試題
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
What is the recommended practice when considering VPN termination and firewall placement?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()
Which signal and noise values will result in the best phone communication with an access point?()