host security
perimeter security
security monitoring
policy management
第1题:
Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()
第2题:
The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()
第3题:
Which three components are part of the Network Entity Title (NET) on an IS-IS router?()
第4题:
Which three methods would help prevent critical network-traffic packet loss on high speed serial interfaces?()
第5题:
Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? ()
第6题:
Which three methods would help prevent critical network-traffic packet loss on high speed interfaces?()
第7题:
When installing a new scanner, Windows XP does not automatically recognize the scanner. Which of the following actions should be taken?()
第8题:
A host is to be part of a very small private network, which will never be connected to any other networks. Which of the following name resolution schemes would be the easiest to implement?()
第9题:
They are separate from the central site and use NAT to route through the Internet to the Central Site
They are part of the VLANs at the Central Site; they are in the same subnets
They use public IP Addresses that are routable through the Internet
They are in separate subnets but are part of the private address space of the network
第10题:
host security
perimeter security
security monitoring
policy management
第11题:
The Application Server server role.
The Fax Server server role.
The Network Policy and Access Services server role.
The Print and Document Services server role.
第12题:
Mis-routed packets
Excess jitter
Delay of critical traffic
Packet loss due to congestion
Data link layer broadcast storms
FTP connections unsuccessful
第13题:
VOIP is being implemented in the Company network and you need to assess the need for QoS. Which of the following network problems would indicate a need to implement QoS features?()
第14题:
A host is to become part of a hierarchical naming topology. Which of the following services are required?()
第15题:
A customer needs the ability to recover their data if a total system failure occurs. Which two of the following are the most important considerations in determining the solution?()
第16题:
A network vulnerability scanner is part of which critical element of network and system security?()
第17题:
What are three of the attributes sought in a target customer for Cisco Smart Foundation services?()
第18题:
Which three components are part of the Intelligent Network Services provided by the Cisco AVVIDframework? ()
第19题:
Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()
第20题:
Which of the following Windows Server 2012 R2 server role are required to share a Web Services on Devices (WSD) compatible network scanner?()
第21题:
computerization of order entry for physicians
compliance with HIPPA requirements
improved bandwidth
greater fault tolerance
第22题:
Mis-routed packets
Excess jitter
Delay of critical traffic
Packet loss due to congestion
Data link layer broadcast storms
FTP connections unsuccessful
第23题:
hose joints are made up
tanks are being topped off
system is being lined up
pumping operation is first started
第24题:
policy routing
increase link capacity
WRED
CBWFQ
LFI
WFQ