多項選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

2.單項選擇題When is the site-to-site remote access model appropriate? ()

A. for multiple ISDN connections
B. for modem concentrated dial-up connections
C. for a group of users in the same vicinity sharing a connection
D. for use by mobile users

3.多項選擇題Which two design concerns must be addressed when designing a multicast implementation?()

A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses




最新試題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項選擇題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:單項選擇題

Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.

題型:單項選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:單項選擇題

What amount of cell overlap ensures smooth roaming for wireless endpoints?()

題型:單項選擇題

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

題型:單項選擇題

Which two of these are advantages of placing the VPN device parallel to the firewall?()

題型:多項選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項選擇題

During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:單項選擇題