A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
您可能感興趣的試卷
你可能感興趣的試題
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates
A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
A.detailed VLAN information
B.an incident response plan
C.results of testing the new network configuration
D.an existing hierarchical network topology
E.a security policy for your organization
You are tasked with designing a security solution for your network.
What information should be gathered prior to designing the solution?()
A.a list of applications currently in use in the network
B.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
C.detailed security device specifications
D.results from pilot network testing
You are tasked with designing a security solution for your network.
What information should be gathered prior to designing the solution?()
A.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
B.detailed security device specifications
C.results from pilot network testing
D.results from a network audit
You are tasked with designing a security solution for your network.
What information should be gathered prior to designing the solution?()
A.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
B.a list of the customer requirements
C.detailed security device specifications
D.results from pilot network testing
Cat6500(config)# router ospf 1
Cat6500(config-router)# network 0.0.0.0 255.255.255.255 area 0
Cat6500(config-router)# nsf Cat6500(config-router)#end
Refer to the exhibit. The configuration is used to enable nonstop forwarding for OSPF on a Catalyst 6500 Series
Switch with redundant supervisor engines.
The default CEF configuration is unchanged. After testing, user traffic is interrupted and NSF is not operational.
What is the most likely reason? ()
A.CEF was not properly configured.
B.OSPF was not properly configured for graceful restart.
C.Stateful switchover was not correctly configured.
D.NSF for OSPF is only supported in area 0.
To initiate testing,
which port does a Cisco IOS IP SLA source use to send a control message to an IP SLA responder? ()
A.UDP port 2020
B.UDP port 1967
C.TCP port 2020
D.ICMP port 1967
A.required at the destination to implement Cisco IOS IP SLA services
B.improves measurement accuracy
C.required for VoIP jitter measurements
D.provides security on Cisco IOS IP SLA messages via LEAP or EAP-FAST authentication
E.responds to one Cisco IOS IP SLA operation per port
F.stores the resulting test statistics
A.only implemented between Cisco source and destination-capable devices
B.statistics provided by syslog, CLI, and SNMP
C.measures delay, jitter, packet loss, and voice quality
D.only monitors VoIP traffic flows
E.provides active monitoring
F.provides passive monitoring
最新試題
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()
What two things will occur when an edge port receives a BPDU?()
Which three statements are true of the Link Aggregation Control Protocol (LACP)?()
Refer to the exhibit. Switch S2 contains the default configuration. Switches S1 and S3 both have had the command spanning-tree mode rapid-pvst issued on them. What will be the result?()
Which statement is correct about the use of the virtual interface on a WLC ?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Which three statements about STP timers are true?()
Which router redundancy protocol cannot be configured for interface tracking?()
Refer to the exhibit. All network links are FastEthernet. Although there is complete connectivity throughout the network, Front Line users have been complaining that they experience slower network performance when accessing the server farm than the Reception office experiences. Based on the exhibit, which two statements are true?()
Refer to the exhibit. What does the command channel-group 1 mode desirable do? ()