网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()
A

It resembles a Layer 2 bridge.

B

Traffic flow through the IPS resembles traffic flow through a Layer 3 router.

C

Inline interfaces which have no IP addresses cannot be detected.

D

Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.


参考答案

参考解析
解析: 暂无解析
更多 “多选题You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device?()AIt resembles a Layer 2 bridge.BTraffic flow through the IPS resembles traffic flow through a Layer 3 router.CInline interfaces which have no IP addresses cannot be detected.DMalicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.” 相关考题
考题 You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?() A.5B.10C.14D.20

考题 You are the Cisco Network Designer in Cisco.com. Which signal and noise values will result in the best phone communication with an access point?() A. signal strength 5dBmB. signal strength 6dBmC. noise level 4dBmD. noise level 5dBm

考题 You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.() A. ensure a loop-free topologyB. protect against user-side loopsC. support business applicationsD. risk of lost connectivity without STP

考题 You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?() A. Flex LinksB. loop-free UC. looped squareD. looped triangle

考题 You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A、5B、10C、14D、20

考题 You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()A、They do not receive unique IP addresses.B、RADIUS or LDAP is required.C、They are assigned addresses from the internal DHCP pool.D、Their traffic appears to originate from the originating host network.

考题 You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()A、EncryptionB、Bandwidth limitsC、Minimal signal lossD、No EMI

考题 Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()A、You may use Cisco Network Assistant to set up the initial configurationB、You must use CLI for initial configurationC、You may use either CLI or CAN for configurationD、You may make a direct connection to the PC from any point on the switchE、You may only make a direct connection from the port with the flashing green LED to the PC

考题 You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security

考题 You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast

考题 You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()A、It resembles a Layer 2 bridge.B、Traffic flow through the IPS resembles traffic flow through a Layer 3 router.C、Inline interfaces which have no IP addresses cannot be detected.D、Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

考题 You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm

考题 If it is properly deployed, a controller-based access point is capable of monitoring all vlans on a network when you select which of the following modes from the ap mode drop-down menu on the controller?()A、mirrorB、rogue detectorC、snifferD、monitor

考题 You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()A、Flex LinksB、loop-free UC、looped squareD、looped triangle

考题 You are the Cisco Network Designer in Cisco.com. Which signal and noise values will result in thebest phone communication with an access point?()A、 signal strength 5dBmB、 signal strength 6dBmC、 noise level 4dBmD、 noise level 5dBm

考题 You are implementing a new frame relay network to provide connectivity between you offices. To do this, you set up the frame relay network using point-to-point subinterfaces.Which of the following does NOT need to be configured?()A、The Frame Relay encapsulation on the physical interface.B、The local DLCI on each subinterface.C、An IP address on the physical interface.D、The subinterface type as point-to-point.

考题 You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?() A、From the Device Manager, open the wireless network adapter properties and click Advanced. B、From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C、From the Wireless Network Connection Properties, select View Wireless Networks. D、From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network. 

考题 Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()A、From Credential Manager, modify the generic credentials.B、From Credential Manager, modify the Windows credentials.C、From Network and Sharing Center, turn on Network discovery.D、From Network and Sharing Center, modify the wireless network connection settings.

考题 单选题You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()A ensure a loop-free topologyB protect against user-side loopsC support business applicationsD risk of lost connectivity without STP

考题 单选题You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A 5B 10C 14D 20

考题 单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A Network managementB Network optimizationC Network securityD Content storage networking

考题 单选题Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()A From Credential Manager, modify the generic credentials.B From Credential Manager, modify the Windows credentials.C From Network and Sharing Center, turn on Network discovery.D From Network and Sharing Center, modify the wireless network connection settings.

考题 单选题You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?()A From the Device Manager, open the wireless network adapter properties and click Advanced. B From the Device Manager, right-click the wireless network adapter and click Scan for hardware changes. C From the Wireless Network Connection Properties, select View Wireless Networks. D From the Wireless Network Connection Properties, click Change Advanced Settings. From the Wireless Networks tab, select Add a preferred network. 

考题 单选题You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()A  They do not receive unique IP addresses.B  RADIUS or LDAP is required.C  They are assigned addresses from the internal DHCP pool.D  Their traffic appears to originate from the originating host network.

考题 多选题You are the network consultant from passguide.com. You have been asked for which two features of optical networks allow data to be transmitted over extremely long distances? ()AEncryptionBBandwidth limitsCMinimal signal lossDNo EMI

考题 单选题You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()A They do not receive unique IP addresses.B RADIUS or LDAP is required.C They are assigned addresses from the internal DHCP pool.D Their traffic appears to originate from the originating host network.

考题 多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates