A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.
您可能感興趣的試卷
你可能感興趣的試題
Which two characteristics are true of a firewall running in routed mode based on the following information?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.
A. dial plans
B. dialed numbers
C. voice mail prompts
D. phone features
A. OSPF is not supported by the design
B. HSRP is not supported by the design
C. preempt tuning of the default gateway is needed
D. the design implements Layer 3 between the access switch and the distribution switch
A. close to the servers
B. close to the end users
C. at the Internet edge
D. in front of web server farms
A. termination devices need routable addresses inside the VPN
B. termination devices need not routable addresses inside the VPN
C. IGP routing protocols will update their routing tables over anIPsec VPN
D. addressing designs need to allow for summarization
A. bandwidth
B. number of plug-ins per scan
C. total number of network devices
D. number of checks in each posture assessment
A. dynamic reconfiguration
B. path MTU discovery
C. auto setup
D. remote management
A. NICs are used for network connectivity.
B. Servers request specific blocks of data.
C. Storage devices are directly connected to servers.
D. A fabric is used as the hardware for connecting servers to storage devices.
E. The TCO is higher because of the cost of director class storage switches.
A. redundant infrastructure
B. clustering of computer systems
C. reduced MTBF
D. continuous operation of computing systems
最新試題
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()