單項選擇題During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()

A.Perform
B.Position
C.Develop
D.Prepare
E.Plan
F.Design


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題When enabling IPS on an ISR using the Cisco SDM IPS Wizard, in what location can the SDF be placed?()

A.On the RAM of the ISR
B.On the USB memory stick of the ISR
C.On the NVRAM of the ISR
D.On the IPS Module of the ISR
E.On the Flash memory of the ISR

4.多項選擇題In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()

A.The names of the VLANs used by the SmartPorts are case insensitive
B.The ports may belong to a configurable data VLAN
C.The names of the VLANs used by the Smartports are not relevant
D.The ports may belong to many VLANs, depending on how many PCs are connected to each port.
E.The names of the VLANs used by the Smartports are case sensitive

5.單項選擇題Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()

A.The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port
B.The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.
C.The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch port
D.The default network setting is "HIGH"

6.多項選擇題When resetting a Catalyst Express switch to factory default settings, which three options are available from the Software Recovery window?()

A.Boot to a password recovery window
B.Boot with the factory default image
C.Erase the system configuration and boot with the factory default IOS image
D.Erase the system configuration and boot from a TFTP-supplied IOS image
E.Erase the System Configuration

最新試題

Your Customer has 21 users, each requiring both PC and IP Phone connectivity. Which is the correct configuration for this customer?()

題型:單項選擇題

Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()

題型:多項選擇題

What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()

題型:單項選擇題

In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()

題型:多項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which Cisco SDM Configuration task would you use to enable access and inspection rules on the WAN interface, preventing any external traffic from entering the network unless that traffic is a reply to a session that originated in the internal network?()

題型:單項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()

題型:單項選擇題

Please study the exhibit.What are two options available when using the Security Audit Configuration task in Cisco SDM?()

題型:多項選擇題

When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()

題型:單項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()

題型:單項選擇題

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()

題型:單項選擇題