第1题:
A.Allow unrestricted access to the console or VTY ports
B.Use a firewall to restrict access from the outside to the network devices
C.Always use Telnet to access the device command line because its data is automatically encrypted
D.Use SSH or another encrypted and authenticated transport to access device configurations
E.Prevent the loss of passwords by disabling password encryption
第2题:
第3题:
第4题:
Which two actions, when taken in combination, will result in an effective network security solution?()
第5题:
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
第6题:
Your network contains an Exchange Server 2010 server. You need to plan a mailbox sharing solution for the organization to meets the following requirements: .Ensure that assistants can read and modify the e-mail messages of their managers .Ensure that assistants can impersonate their managers when they send e-mail messages What should you include in the plan?()
第7题:
Configure Internet Authentication Service (IAS) for accounting.
Configure the server running Routing and Remote Access to support L2TP.
Configure the server running Routing and Remote Access to restrict dial-in traffic to the NewApp servers only.
Create a separate account for remote access users. Configure these accounts to access the NewApp server only.
第8题:
In the autonomous access point solution, control is provided by the WLAN controller.
In the lightweight access point solution, WLAN management is provided by the WLAN Control System (WCS).
In the autonomous access point solution, control is provided by the WDS (Wireless Domain Services).
Cisco Aironet autonomous access points cannot be supported by the Cisco Unified Wireless Network.
Ii the lightweight access point solution, WLAN management is provided by the WLAN Solution Engine (WLSE).
Cisco Aironet lightweight access points cannot be supported by the Cisco Unified Wireless Network.
第9题:
NAC can authenticate using 802.1X and IBNS cannot
NAC can ensure only compliant machines connect and IBNS cannot
NAC can ensure access to the correct network resources and IBNS cannot
NAC can manage user mobility and reduce overhead costs and IBNS cannot
第10题:
Source IP and browser
Source IP and certificate
Certificate and Host Checker
Host Checker and source IP
第11题:
NAC can authenticate using 802.1X and IBNS cannot
NAC can ensure only compliant machines connect and IBNS cannot
NAC can ensure access to the correct network resources and IBNS cannot
NAC can manage user mobility and reduce overhead costs and IBNS cannot
第12题:
Wireless Domain Services (WDS)
Access Control Server (ACS)
Lightweight Access Point Protocol (LWAPP)
Wireless LAN solution Engine (WLSE)
Wireless Services Module (WISM)
Wireless Control System (WCS)
第13题:
第14题:
第15题:
pany is deploying a Cisco autonomous WLAN solution in their network. Which three components are included in this solution?()
第16题:
What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()
第17题:
Which statements describe the capabilities of the DBMS_NETWORK_ACL_ADMIN package?()
第18题:
You are designing a security strategy for users who need remote access to the corporate network. What should you do?()
第19题:
develop a policy for securing the network
monitor and test network activities for vulnerabilities
implement reflexive access lists
implement dynamic access lists
select and implement a single comprehensive virus protection program
第20题:
Allow unrestricted access to the console or VTY ports
Use a firewall to restrict access from the outside to the network devices
Always use Telnet to access the device command line because its data is automatically encrypted
Use SSH or another encrypted and authenticated transport to access device configurations
Prevent the loss of passwords by disabling password encryption
第21题:
user name
password length
certificate
Host Checker
第22题:
State synchronization occurs only through the internal network interface card (NIC)
Latency of the WAN must be less than 300 ms.
Authenticating endpoints must be on the same LAN segment.
Cluster members must use the same hardware platfor
第23题:
Configure the wireless access points in Denver and Dallas to filter unauthorized Media Access Control (MAC) addresses
Configure the wireless network connection properties for all computers in Denver and in Dallas to use the same network name that the wireless access points use
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and configure it to use Windows to configure wireless network settings for the Denver and the Dallas networks
Create a GPO and link it to the Denver OU and to the Dallas OU. Create a wireless network policy and enable data encryption and dynamic key assignments for the Denver and Dallas networks