單項選擇題

Please match the Cisco NAC appliance component to its description.()
(1)Cisco NAS
(2)Cisco NAA
(3)Rule-set Lpdates
(4)Cisco NAM
(a) a centralized management point
(b) an in-band cr out-of-band device for network access control
(c) a Windows-based client which allows network access based on the tasks running
(d) a status crecker for operating systems,antivirus,antispyware,etc.

A.(a)-(4);(b)-(1);(c)-(2);(d)-(3)
B.(a)-(3);(b)-(2);(c)-(4);(d)-(1)
C.(a)-(4);(b)-(3);(c)-(1);(d)-(2)
D.(a)-(2);(b)-(4);(c)-(3);(d)-(1)



您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

A. Design 1 is a looped triangle design.
B. Design 2 is a looped triangle design.
C. Design 2 achieves quick convergence using RSTP.
D. Both designs supportstateful services at the aggregation layer.
E. Design 2 is the most widely deployed in enterprise data centers.


4.單項選擇題Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()

A. EIGRP can summarize per interface.
B. OSPF router databases remain independent.
C. When they are configured with stubs, EIGRP regularly floods the topology.
D. OSPF topology decisions are made independent of hierarchy or area.

5.單項選擇題Which of the following is the primary consideration to scale VPNs?()

A. packets per second
B. number of remote sites
C. throughput bandwidth
D. number of tunnels

6.單項選擇題In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. DynamicMultipoint VPN
E. Group Encrypted Transport VPN

7.多項選擇題Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall

8.多項選擇題Which two of these are advantages of placing the VPN device parallel to the firewall?()

A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection

9.單項選擇題What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall

10.單項選擇題What is the recommended practice when considering VPN termination and firewall placement?()

A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall

最新試題

One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

題型:單項選擇題

What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

題型:單項選擇題

Which three of these are important when determining NAS Server scaling? ()

題型:多項選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:單項選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項選擇題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項選擇題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:單項選擇題