更多“单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A VLANB Peer to PeerC VTPD VPN”相关问题
  • 第1题:

    Which of the following network topologies BEST describes a VPN? ()(Select TWO)

    A. Point to Point

    B. Point to Multipoint

    C. VLAN

    D. Ring

    E. Bus


    参考答案:A, B

  • 第2题:

    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()

    • A、VLAN
    • B、Peer to Peer
    • C、VTP
    • D、VPN

    正确答案:D

  • 第3题:

    Which of the following describes a secure connection over the Internet between two sites?()

    • A、FTP
    • B、VLAN
    • C、VPN
    • D、HTTP

    正确答案:C

  • 第4题:

    You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()

    • A、Implement a Cisco Secure IPS sensor.
    • B、Implement 802.1X on the switch ports.
    • C、Take no action, you have achieved your goal.
    • D、Implement a protected port on the access switches.

    正确答案:D

  • 第5题:

    Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()

    • A、Trunking
    • B、LAN
    • C、VPN
    • D、Peer to peer

    正确答案:C

  • 第6题:

    Physical and logical network diagrams are used for which of the following configuration management goals?()

    • A、Track DHCP distribution
    • B、Compare MAC and IP addresses
    • C、Document Internet access history
    • D、Identity network devices

    正确答案:D

  • 第7题:

    单选题
    You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()
    A

    Take no action, you have achieved your goal.

    B

    Implement a Cisco Secure IPS sensor.

    C

    Implement a protected port on the access switches.

    D

    Implement 802.1X on the switch ports.


    正确答案: C
    解析: 暂无解析

  • 第8题:

    单选题
    Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()
    A

    ARP

    B

    SSH

    C

    Telnet

    D

    WEP

    E

    SNMPv1

    F

    SNMPv2


    正确答案: E
    解析: 暂无解析

  • 第9题:

    多选题
    Which of the following network topologies BEST describes a VPN? ()(Select TWO)
    A

    Point to Point

    B

    Point to Multipoint

    C

    VLAN

    D

    Ring

    E

    Bus


    正确答案: C,D
    解析: 暂无解析

  • 第10题:

    单选题
    A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?()
    A

    Call their local ISP

    B

    Verify the IP information of the server

    C

    Check their local Internet connection

    D

    Verify the hostname of the server


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    Physical and logical network diagrams are used for which of the following configuration management goals?()
    A

    Track DHCP distribution

    B

    Compare MAC and IP addresses

    C

    Document Internet access history

    D

    Identity network devices


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()
    A

    Take no action, you have achieved your goal.

    B

    Implement a Cisco Secure IPS sensor.

    C

    Implement a protected port on the access switches.

    D

    Implement 802.1X on the switch ports.


    正确答案: A
    解析: 暂无解析

  • 第13题:

    A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.

    A.encoded
    B.encrypted
    C.stored
    D.transmitted

    答案:D
    解析:

  • 第14题:

    Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()

    • A、 ARP
    • B、 DMZ
    • C、 VLAN
    • D、 VPN

    正确答案:C

  • 第15题:

    It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()

    • A、IPSec
    • B、IPSec with GRE
    • C、DMVPN
    • D、EZVPN
    • E、all of the choices

    正确答案:E

  • 第16题:

    You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()

    • A、Take no action, you have achieved your goal.
    • B、Implement a Cisco Secure IPS sensor.
    • C、Implement a protected port on the access switches.
    • D、Implement 802.1X on the switch ports.

    正确答案:C

  • 第17题:

    Which of the following network topologies BEST describes a VPN? ()(Select TWO)

    • A、Point to Point
    • B、Point to Multipoint
    • C、VLAN
    • D、Ring
    • E、Bus

    正确答案:A,B

  • 第18题:

    An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()

    • A、NAT
    • B、WPS
    • C、MAC filtering
    • D、Port forwarding

    正确答案:A

  • 第19题:

    单选题
    An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()
    A

    NAT

    B

    WPS

    C

    MAC filtering

    D

    Port forwarding


    正确答案: A
    解析: 暂无解析

  • 第20题:

    单选题
    Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
    A

    VLAN

    B

    Peer to Peer

    C

    VTP

    D

    VPN


    正确答案: D
    解析: 暂无解析

  • 第21题:

    单选题
    Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()
    A

     ARP

    B

     DMZ

    C

     VLAN

    D

     VPN


    正确答案: B
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following describes a secure connection over the Internet between two sites?()
    A

    FTP

    B

    VLAN

    C

    VPN

    D

    HTTP


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
    A

    IPSec

    B

    IPSec with GRE

    C

    DMVPN

    D

    EZVPN

    E

    all of the choices


    正确答案: B
    解析: 暂无解析

  • 第24题:

    单选题
    Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()
    A

    Mesh

    B

    Bus

    C

    Ring

    D

    Star


    正确答案: B
    解析: 暂无解析