host security
perimeter security
security monitoring
policy management
第1题:
A. host security
B. perimeter security
C. security monitoring
D. policy management
第2题:
Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()
第3题:
You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()
A. OSPF
B. RIP
C. BGP
D. static
第4题:
Which three components are part of the Network Entity Title (NET) on an IS-IS router?()
第5题:
The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()
第6题:
A. IP telephony
B. security
C. IP multicasting
D. QoS
第7题:
VOIP is being implemented in the Company network and you need to assess the need for QoS. Which of the following network problems would indicate a need to implement QoS features?()
第8题:
A. Honeynet
B. Honeypot
C. Vulnerability scanner
D. Network based IDS
第9题:
A host is to become part of a hierarchical naming topology. Which of the following services are required?()
第10题:
A customer needs the ability to recover their data if a total system failure occurs. Which two of the following are the most important considerations in determining the solution?()