多項選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

2.單項選擇題When is the site-to-site remote access model appropriate? ()

A. for multiple ISDN connections
B. for modem concentrated dial-up connections
C. for a group of users in the same vicinity sharing a connection
D. for use by mobile users

3.多項選擇題Which two design concerns must be addressed when designing a multicast implementation?()

A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses




最新試題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項選擇題

Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

題型:單項選擇題

As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()

題型:單項選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項選擇題

One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:單項選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:單項選擇題

Which of these is true of a Layer 3 out-of-band NAS deployment?()

題型:單項選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項選擇題