單項(xiàng)選擇題What is a primary objective of the security architecture assessment? ()

A. document power and UPS availability
B. to integrate routing and switching components
C. create a design specification document
D. document the customer's current and future technology projects


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is the final step of the core baselining process?()

A. Implement threshold monitoring using RMON.
B. Implement monitoring using SNMP or RMON.
C. Poll and record specific SNMP MIB objects from the device.
D. Verify that SNMP MIB is supported in the relevant core device.

2.單項(xiàng)選擇題Which PIN architecture works with DMVPN, GETVPN, and Ethernet? ()

A. data center
B. teleworker
C. branch
D. campus

3.多項(xiàng)選擇題What are the characteristics of the process of documenting the layers of an existing network? ()

A. begins with gathering organizational input that may be inaccurate
B. begins with gathering organizational input that does not need to be supplemented by a network audit
C. requires a network audit to support some upgrade decisions
D. requires a network audit to support any network restructuring
E. provides reliable input for verifying network consistency
F. does not provide reliable input for designing changes

4.多項(xiàng)選擇題What are two characteristics of the Cisco Validated Design program? ()(Choose two.)

A. facilitates customer deployments that are less reliable
B. facilitates customer deployments that are more predictable
C. separates products and technologies into individual portfolios
D. incorporates products and technologies into a broad portfolio
E. strives to protect access to design documentation

5.單項(xiàng)選擇題What is the final step that should take place when characterizing an existing network? ()

A. Form an impression about the network.
B. Prepare and add to the network description.
C. Use traffic analysis to augment organizational input.
D. Perform a network audit.

6.多項(xiàng)選擇題What are two characteristics of the relationship between the Cisco PIN architecture and Cisco Validated Designs? ()(Choose two.)

A. Cisco is focusing on Cisco Validated Designs as a means to driving integrated networks.
B. Cisco is focusing on the PIN architecture as a means to driving integrated networks.
C. The Cisco PIN architecture is a critical mechanism for supporting integrated markets because it can be implemented quickly.
D. The Cisco Validated Designs program provides critical mechanisms for supporting integrated markets because the mechanisms can be implemented quickly.
E. Cisco Validated Designs can be implemented quickly without customer input.

7.單項(xiàng)選擇題What is a characteristic of the Cisco Validated Design architectural selling approach?()

A. This approach separates technologies based on customer buying patterns.
B. This approach integrates solutions by combining technologies that are aligned to customer buying patterns.
C. Although this approach supports verticalization, it is not aligned to partner programs.
D. Although this approach is aligned to partner programs, it does not support verticalization.

8.單項(xiàng)選擇題What is the first step of the core baselining process? ()

A. Verify that the SNMP MIB is supported in the relevant core device.
B. Implement monitoring using SNMP or RMON.
C. Poll and record specific SNMP MIB objects from the device.
D. Implement threshold monitoring using RMON.

9.多項(xiàng)選擇題Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)

A. includes three design levels
B. incorporates products and technologies into enterprise, service provider, and commercial systems
C. extends the value of designs through a sustained development plan
D. does not factor customer input design process
E. facilitates faster and more reliable customer deployments
F. incorporates a narrow range of technologies and products

10.單項(xiàng)選擇題Which description best characterizes the Cisco mobility solution?()

A. provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit
B. authenticates users and devices so that it is impossible for a rogue device to be connected to the network
C. allows you to centralize management, automate repetitive tasks, and provision IP services easily
D. centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

最新試題

You are trying to initiate an SSH connection to a remote router and are getting rejected with an error code of 0. Which of these might be the cause of the error?()

題型:?jiǎn)雾?xiàng)選擇題

Which Cisco IOS command is used to troubleshoot a problem in which a BGP session stays in the active state?()

題型:?jiǎn)雾?xiàng)選擇題

Referring to the partial Cisco Catalyst switch configuration shown, which two of these statements are correct? ()(Choose two.)

題型:多項(xiàng)選擇題

When a Cisco router is configured for SSH, it acts as an ()?

題型:?jiǎn)雾?xiàng)選擇題

Which three of these items are IPv6 transition mechanisms? ()(Choose three.)

題型:多項(xiàng)選擇題

Which description is making sense on the basis of the given information?()

題型:?jiǎn)雾?xiàng)選擇題

You have just reinstalled a VIP 6-80 in a Cisco 7500 Series router. What must you do to bring up the port adapter interfaces?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. You have a non-Cisco switch that is not communicating properly while connected to the distribution-layer Cisco switching fabric.Which two best-practice actions can you take to overcome this problem? ()(Choose two.)

題型:多項(xiàng)選擇題

Refer to the exhibit. Which SSH sessions will the SSH server accept?()

題型:?jiǎn)雾?xiàng)選擇題

Which keyword is used with the show ip bgp neighbors [keyword] command to display all routes that are received and accepted from a neighbor?()

題型:?jiǎn)雾?xiàng)選擇題