VLAN
Peer to Peer
VTP
VPN
第1题:
A. Point to Point
B. Point to Multipoint
C. VLAN
D. Ring
E. Bus
第2题:
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
第3题:
Which of the following describes a secure connection over the Internet between two sites?()
第4题:
You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()
第5题:
Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()
第6题:
Physical and logical network diagrams are used for which of the following configuration management goals?()
第7题:
Take no action, you have achieved your goal.
Implement a Cisco Secure IPS sensor.
Implement a protected port on the access switches.
Implement 802.1X on the switch ports.
第8题:
ARP
SSH
Telnet
WEP
SNMPv1
SNMPv2
第9题:
Point to Point
Point to Multipoint
VLAN
Ring
Bus
第10题:
Call their local ISP
Verify the IP information of the server
Check their local Internet connection
Verify the hostname of the server
第11题:
Track DHCP distribution
Compare MAC and IP addresses
Document Internet access history
Identity network devices
第12题:
Take no action, you have achieved your goal.
Implement a Cisco Secure IPS sensor.
Implement a protected port on the access switches.
Implement 802.1X on the switch ports.
第13题:
第14题:
Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()
第15题:
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
第16题:
You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()
第17题:
Which of the following network topologies BEST describes a VPN? ()(Select TWO)
第18题:
An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()
第19题:
NAT
WPS
MAC filtering
Port forwarding
第20题:
VLAN
Peer to Peer
VTP
VPN
第21题:
ARP
DMZ
VLAN
VPN
第22题:
FTP
VLAN
VPN
HTTP
第23题:
IPSec
IPSec with GRE
DMVPN
EZVPN
all of the choices
第24题:
Mesh
Bus
Ring
Star