更多“Which component of VPN technology ensures that data can be r”相关问题
  • 第1题:

    Which prepare phase service component involves recommending an appropriate technology that will address a customers business requirements? Select exactly 1 answer(s) from the following:()。

    • A、Technology Strategy Development
    • B、Account Qualification and Planning
    • C、Business Case Development
    • D、Proof of Concept

    正确答案:A

  • 第2题:

    Cisco Small Business products address which installation requirement more effectively than standard Cisco products?()

    • A、wireless technology integration
    • B、use of advanced reporting functions
    • C、VPN technology integration
    • D、minimal technical complexity

    正确答案:D

  • 第3题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?() (Choose three.)

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,B,C

  • 第4题:

    Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?()

    • A、 availability
    • B、 performance
    • C、 functionality
    • D、 manageability

    正确答案:C

  • 第5题:

    Which technology is best suited for the most scalable means to separate the data plane for aLayers VPN?()

    • A、 GRE
    • B、 802 1Q
    • C、 MPLS
    • D、 L2TPv3

    正确答案:B

  • 第6题:

    Routers can be used to integrate a variety of services. Which two common services are often specified by businesses?()

    • A、 Mitigation and Response
    • B、 Fibre Channel over Ethernet
    • C、 IP communications
    • D、 Data Center Virtualization
    • E、 VPN security

    正确答案:C,E

  • 第7题:

    A customer asks for help choosing their WAN technology, the customer is looking for A solution that can be used across very long distances, provides QoS and VPN support, and is sensitive to their budgeting needs ,which WAN technology would you recommend?()

    • A、wide transport
    • B、metroethernet
    • C、frame relay
    • D、leaseD line
    • E、MPLS

    正确答案:E

  • 第8题:

    Which two statements are true about checkpointing()

    • A、The checkpoint frequency decreases with the smaller redo log file size.
    • B、It ensures that all committed data is written to the data files during normal shutdown.
    • C、The frequent full checkpoint in a database can cause the overall degradation of the database performance.
    • D、It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.

    正确答案:B,C

  • 第9题:

    单选题
    Which option ensures that data is not modified in transit?()
    A

    Authorization

    B

    Confidentiality

    C

    Authentication

    D

    Integrity


    正确答案: D
    解析: 暂无解析

  • 第10题:

    单选题
    Which component of VPN technology ensures that data can be read only by its intended recipient?()
    A

    data integrity

    B

    encryption

    C

    key exchange

    D

    authentication


    正确答案: D
    解析: 暂无解析

  • 第11题:

    单选题
    Which technology is best suited for the most scalable means to separate the data plane for aLayers VPN?()
    A

     GRE

    B

     802 1Q

    C

     MPLS

    D

     L2TPv3


    正确答案: D
    解析: 暂无解析

  • 第12题:

    单选题
    Which component of VPN technology ensures that data can be read only by its intended recipient?()
    A

    dataintegrity

    B

    encryption

    C

    keyexchange

    D

    authentication


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A customer asks for help choosing their WAN technology, the customer is looking for A solution that can be used across very long distances, provides QoS and VPN support, and is sensitive to their budgeting needs , which WAN technology would you recommend?()

    • A、MPLS
    • B、framerelay
    • C、leaseDline
    • D、metroethernet
    • E、widetransport

    正确答案:A

  • 第14题:

    Which  statements are true about checkpointing()

    • A、The checkpoint frequency decreases with the smaller redo log file size.
    • B、It ensures that all committed data is written to the data files during normal shutdown.
    • C、The frequent full checkpoint in a database can cause the overall degradation of the database performance.
    • D、It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the onlineredo log files

    正确答案:B,C

  • 第15题:

    Which component of VPN technology ensures that data can be read only by its intended recipient?()

    • A、data integrity
    • B、encryption
    • C、key exchange
    • D、authentication

    正确答案:D

  • 第16题:

    The Cisco UC520 provides integrated WLAN connectivity to mobile clients for which technology?()

    • A、voice only
    • B、data and voice
    • C、data only

    正确答案:B

  • 第17题:

    Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()

    • A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.
    • B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.
    • C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.
    • D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

    正确答案:A

  • 第18题:

    Which prepare phase service component involves providing a customer with a financial justification for adopting a technology? Select exactly 1 answer(s) from the following:()。

    • A、Technology Strategy Development
    • B、High-Level Design Development
    • C、Business Case Development
    • D、Proof of Concept

    正确答案:C

  • 第19题:

    Which three security concerns can be addressed by a tunnel mode IPsec VPN secured by ESP?()

    • A、data integrity
    • B、data confidentiality
    • C、data authentication
    • D、outer IP header confidentiality
    • E、outer IP header authentication

    正确答案:A,B,C

  • 第20题:

    单选题
    A customer asks for help choosing their WAN technology, the customer is looking for A solution that can be used across very long distances, provides QoS and VPN support, and is sensitive to their budgeting needs ,which WAN technology would you recommend?()
    A

    wide transport

    B

    metroethernet

    C

    frame relay

    D

    leaseD line

    E

    MPLS


    正确答案: E
    解析: 暂无解析

  • 第21题:

    单选题
    Which statement is true?()
    A

     A flow layout can be used to position a component that should resize horizontally when the  container is resized.

    B

     A grid layout can be used to position a component tat should maintain a constant size even when  the container is resized.

    C

     A border layout can be used to position component that should maintain a constant size even when  the container is resized.

    D

     The grid bag layout can be used to give a grid-like layout which differs from the normal grid in that individual rows and columns can have unique sizes.

    E

     If two components are placed in the same column of a grid bag layout, and one component resizes horizontally, then the other component must resize horizontally.


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()
    A

     Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.

    B

     Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.

    C

     Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.

    D

     Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.


    正确答案: A
    解析: 暂无解析

  • 第23题:

    多选题
    Which two statements are true about checkpointing()
    A

    The checkpoint frequency decreases with the smaller redo log file size.

    B

    It ensures that all committed data is written to the data files during normal shutdown.

    C

    The frequent full checkpoint in a database can cause the overall degradation of the database performance.

    D

    It prompts the Checkpoint (CKPT) process to write data to the data files and redo information to the online redo log files.


    正确答案: C,A
    解析: 暂无解析

  • 第24题:

    单选题
    A customer asks for help choosing their WAN technology, the customer is looking for A solution that can be used across very long distances, provides QoS and VPN support, and is sensitive to their budgeting needs , which WAN technology would you recommend?()
    A

    MPLS

    B

    framerelay

    C

    leaseDline

    D

    metroethernet

    E

    widetransport


    正确答案: C
    解析: 暂无解析