Two access points running the core feature set are connected to the same switch and are providing guest services. if pspf is enabled. What must be enabled on the switch to prevent clients from seeing one another’s data?()
第1题:
A user typically connects to the Internet in one of two ways: dedicated access and()access.
第2题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第3题:
What are two reasons that a network administrator would use access lists? (Choose two.) ()。
第4题:
Your network contains two Active Directory sites. The sites connect to each other by using a WAN link. You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite. Each site will contain a Client Access array. You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements: .Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange servers What are two possible ways to achieve this goal?()
第5题:
You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company. You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers. You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails. What should you recommend?()
第6题:
SSL
SSH
Telnet
HTTP
第7题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第8题:
Member data have no access modifiers.
Member data can be modified directly.
The access modifier for methods is protected.
The access modifier to member data is private.
Methods provide for access and modification of data.
第9题:
Having Access to the current software releases and support for software packages
Having direct or indirect access to the Cisco TAC global organization
Having improved network availability and performance
HavingThe ability to access a group of experts
第10题:
Which two demonstrate encapsulation of data? ()
第11题:
Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()
第12题:
How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()
第13题:
Your network consists of a single Active Directory site. You plan to deploy Exchange Server 2010. You need to plan the deployment of Exchange Server 2010 servers to meet the following requirements:.All Mailbox servers must belong to a database availability group (DAG) .MAPI connections from Outlook clients must be load balanced by using a hardware load balancer .If a single server fails, users must continue to send and receive e-mail .The plan must minimize the number of servers deployed What should you include in the plan?()
第14题:
Your network contains two Active Directory sites. The sites connect to each other by using a WAN link. You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite. Each site will contain a Client Access array. You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements:.Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange servers What are two possible ways to achieve this goal?()
第15题:
Mobility Services Engine
WLAN controller
Cisco Wireless Control System
rugged/exterior access points
interior access points
第16题:
By adding two separate connections in the connections dialog box
By adding two separate intranet Controllers under the configuration hierarchy
By adding one intranet Controller and one SA under the configuration hierarchy
By adding two URLs under a connection in the connections dialog box
第17题:
assigning a private IP address to the AP
changing the default SSID value
configuring a new administrator password
changing the mixed mode setting to single mode
configuring traffic filtering
第18题:
need one access point
want to provide unsecured wireless access
need between two and three access points
want to provide employee wireless access
need more than four access points
want to provide guest wireless access