A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
第1题:
You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()
第2题:
You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()
第3题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第4题:
Which two statements describe the functions and operations of IDS and IPS systems?()
第5题:
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()
第6题:
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?()
第7题:
Control traffic between an access point and a controller is encrypted within LWAPP.
Data traffic between an access point and a controller is encrypted within LWAPP.
Layer 3 mode packets are transmitted in TCP frames.
Data traffic between an access point and a controller is encapsulated within LWAPP.
VLAN tagging and QoS markings are applied at the access point.
第8题:
ensure a loop-free topology
protect against user-side loops
support business applications
risk of lost connectivity without STP
第9题:
Network management
Network optimization
Network security
Content storage networking
第10题:
bridging VLANs on two switches
bridging two VLANs on one switch
between two Layer 2 devices with trunking
between two Layer 2 devices without trunking
between a Layer 2 device and a Layer 3 device with trunking
第11题:
From the Device Manager, open the wireless network adapter properties and click Advanced.
From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes.
From the Wireless Network Connection Properties, select View Wireless Networks.
From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network.
第12题:
Encryption
Bandwidth limits
Minimal signal loss
No EMI
第13题:
Which two of these are characteristics of an IPS device?()
第14题:
Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()
第15题:
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()
第16题:
In which two locations in an enterprise network can an IPS sensor be placed? ()
第17题:
The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()
第18题:
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()
第19题:
With a network wide mask of 255.255.255.128, each interface does not require an IP address.
With a network wide mask of 255.255.255.128, each interface does require an IP address on a unique IP subnet.
With a network wide mask of 255.255.255.0, must be a Layer 2 device for the PCs to communicate with each other.
With a network wide mask of 255.255.255.0, must be a Layer 3 device for the PCs to communicate with each other.
With a network wide mask of 255.255.254.0, each interface does not require an IP address.
第20题:
VPN
InfiniBand
SCSI over IP
Remote Direct Memory Access
第21题:
bridging VLANs on two switches
bridging two VLANs on one switch
between two Layer 2 devices withtrunking
between two Layer 2 devices withouttrunking
between a Layer 2 device and a Layer 3 device withtrunking
第22题:
passively listens to network traffic
is an active device in the traffic path
has a permissive interface that is used to monitor networks
traffic arrives on one IPS interface and exits on another
第23题:
They do not receive unique IP addresses.
RADIUS or LDAP is required.
They are assigned addresses from the internal DHCP pool.
Their traffic appears to originate from the originating host network.
第24题:
They do not receive unique IP addresses.
RADIUS or LDAP is required.
They are assigned addresses from the internal DHCP pool.
Their traffic appears to originate from the originating host network.