單項(xiàng)選擇題A network vulnerability scanner is part of which critical element of network and system security?()

A. host security
B. perimeter security
C. security monitoring
D. policy management


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module,which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

5.多項(xiàng)選擇題Which two statements are true about MLP interleaving? ()

A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.

6.單項(xiàng)選擇題ou are the Cisco Network Designer in Cisco.com. Which of these practices should you followwhen designing a Layer 3 routing protocol?()

A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

7.單項(xiàng)選擇題Which statement about CiscoWorks 2000 Inventory Manager is true?()

A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.

8.多項(xiàng)選擇題

Which two characteristics are true of a firewall running in routed mode based on the following information?()

A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.

9.多項(xiàng)選擇題Which three things can be restricted by the Class of Service in a traditional PBX? ()

A. dial plans
B. dialed numbers
C. voice mail prompts
D. phone features

10.單項(xiàng)選擇題Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()

A. EIGRP can summarize per interface.
B. OSPF router databases remain independent.
C. When they are configured with stubs, EIGRP regularly floods the topology.
D. OSPF topology decisions are made independent of hierarchy or area.

最新試題

What is the traditional mode for a firewall?()

題型:?jiǎn)雾?xiàng)選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項(xiàng)選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:?jiǎn)雾?xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement about Fibre Channel communications is correct?()

題型:?jiǎn)雾?xiàng)選擇題

To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()

題型:?jiǎn)雾?xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:?jiǎn)雾?xiàng)選擇題

What are two characteristics of GSS? ()

題型:多項(xiàng)選擇題