Which three are considered match criteria in a policy?()
第1题:
Which factors must be most considered when developing acceptance criteria(72)
A.Match with requirements
B.User availability
C.Ability to benchmark system
D.Schedule of system delivery
第2题:
Which two statements about the open and shared key wireless-authentication methods are true? ()
第3题:
Which three statements are true about terms in a policy?()
第4题:
Which three statements are true about terms in a policy?()
第5题:
Which of the following describes the roles of devices in a WAN (Choose three.)()。
第6题:
Which two statements about the open and shared key wireless-authentication methods are true?()
第7题:
Which three steps are considered part of the initial configuration?()
第8题:
A firewall in routed mode has one IP address
A firewall in transparent mode has one IP address
In routed mode, the firewall is considered to be a Layer 2 dew
In routed mode, the firewall is considered to be a Layer 3 device
In transparent mode, the firewall is considered to be a Layer 2 device
In transparent mode, the firewall is considered to be a Layer 3 device
第9题:
protocol
source-address
port
application
attacks
第10题:
The order of the terms in a policy is irrelevant
The action is specified in a then statement
Ters are optional in a policy
The match condition can be identified with a from statement
Every policy must contain at least one term
第11题:
Shared key authentication is considered more secure than open authentication.
Shared key authentication is considered less secure than open authentication.
If the WEP keys do not match using the open authentication method, the client will not authenticate, associate, and transfer data.
If the WEP keys do not match using the open authentication method, the client will still be able to authenticate and associate, but will not transfer data.
If the WEP keys do not match using the open authentication method, the client will still be able to authenticate, associate, and transfer data.
第12题:
protocol
source-address
port
application
attacks
第13题:
Given two different character sets (A and B), which of the following must be true for A to be considered a strict superset of B?()
第14题:
Which three statements about firewall modes are correct? ()
第15题:
Which three options represent IDP policy match conditions?()
第16题:
Which three options represent IDP policy match conditions? ()(Choose three.)
第17题:
Which three options are considered in the spanning-tree decision process?()
第18题:
Given the community: community my-company members "^[1-3]*7:666$"; Which three communitiesdoes this expression match?()
第19题:
the size of an undo block
the size of the redo log files
undo blocks generated per second
the size of the database buffer cache
the value of the UNDO_RETENTION parameter
第20题:
lowest root bridge ID
lowest path cost to root bridge
lowest sender bridge ID
highest port ID
highest root bridge ID
highest path cost to root bridge
第21题:
A must contain all of the characters defined in B
A must be Unicode
The encoded values in A must match the encoded values in B for all characters defined in B
A must be a multibyte character set
The encoded values in A must match the encoded values in B for all numeric and alphabetic characters in B
第22题:
service
to-zone
attacks
port
destination-address
第23题:
SNMP
hostname
root password
user password
management access interface
第24题:
prefix-list
protocol ospf
next-term
AS path
prefix-term