网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()
A

The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port

B

The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.

C

The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch port

D

The default network setting is HIGH


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD The default network setting is HIGH” 相关考题
考题 You want to set the following initialization parameters for your database instance:Identify the statement that correctly describes this setting.() A. The MANDATORY location must be a flash recovery area.B. The optional destinations may not use the flash recovery area.C. This setting is not allowed because the first destination is not set as MANDATORY.D. The online redo log file is not allowed to be overwritten if the archived log cannot be created in the fourth destination.

考题 Which statement describes a security zone?() A. A security zone can contain one or more interfaces.B. A security zone can contain interfaces in multiple routing instances.C. A security zone must contain two or more interfaces.D. A security zone must contain bridge groups.

考题 Which statement describes the primary difference between the WX and WXC platforms?() A. The WX platform has built-in hard drives.B. The WXC platform has no built-in hard drives.C. The WX platform uses Network Sequence Caching technology.D. The WXC platform uses the Network Sequence Caching technology

考题 A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle

考题 IPsec, also known as the internet Protocol ( ) , defines the architecture for security services for IP network traffic IPsec describes the framework for providing security a the IP layer, as well as the suite of protocols designed to provide that security: through_ ( )_ and encryption of IP network packets. IPec can be used 10 protect network data, for example, by setting up circuits using IPsec ( ), in which all data being sent between two endpoints is encrypted, as with a Virtual (请作答此空) Network connection ;for encrypting application layer data ;and for providing security for routers sending routing data across the public internet. Internet traffic can also be secured from host to host without the use of IPsec, for example by encryption at the ( ) layer with HTTP Secure (TTPS)or an the transport layer wit the Transport Layer Security (TLS)protocol.A.pubic] B.private] C.personal D.proper

考题 Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()A、The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch portB、The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.C、The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch portD、The default network setting is "HIGH"

考题 The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()A、 ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.B、 ISRs provide the framework to integrate and extend wired and wireless networksC、 ISRs provide concurrent security, voice, data, wireless, and application optimization services.D、 ISRS provide the common fabric, functionality, and CLI across the network.

考题 Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

考题 A network vulnerability scanner is part of which critical element of network and system security?()A、host securityB、perimeter securityC、security monitoringD、policy management

考题 Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?()A、The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the ingress edge LSRB、TTL propagation cannot be disabled in an MPLS domainC、TTL propagation is only disabled on the ingress edge LSRD、The TTL field of the MPLS label header is set to 255E、The TTL field of the IP packet is set to 0

考题 Which two statement best describes the Cisco Unified Wireless Network? ()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANsB、 The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANsC、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNsD、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LANs

考题 As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()A、Create a design specification document.B、Integrate routing and switching components.C、Document power and UPS availabilityD、Document the customer's current and future technology projects.

考题 Which statement correctly describes a situation in which VRFs are used in the data center?()A、Partitioning of network resources is enabled.B、VRFs cannot support path isolation from MAN/WAN designs.C、VRFs cannot be used to map a virtualized data center to a MPLS implementation.D、VRFs do not allow for the use of application services with multiple access topologies.E、An access design using a VRF allows for an aggregation layer service module solution.

考题 Which of the following BEST describes the function of a DNS server?()A、Secures network traffic through shared key encryption.B、Provides resolution of host names to IP addresses.C、Provides security for a network through the use of ACLs.D、Dynamically assigns IP addresses for easy client configuration.

考题 A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle

考题 An administrator is setting up a security camera that will send the same feed to twelve of the twenty workstations on the network. Which of the following addressing schemes was designed for this scenario?()A、MulticastB、UnicastC、BroadcastD、Peer-to-peer

考题 Which of the following would be used to test out the security of a specific network by allowing it toreceive security attacks?()A、HoneynetB、HoneypotC、Vulnerability scannerD、Network based IDS

考题 Which statement describes the primary difference between the WX and WXC platforms?()A、The WX platform has built-in hard drives.B、The WXC platform has no built-in hard drives.C、The WX platform uses Network Sequence Caching technology.D、The WXC platform uses the Network Sequence Caching technology

考题 单选题Which of the following correctly describes the word stress? _____A iDentify, iDentifiable, iDentifierB idenTify, iDentifiable, identiFierC iDentify, identiFiable, iDentifierD idenTify, iDentifiable, identiFier

考题 单选题Which statement describes the primary difference between the WX and WXC platforms?()A The WX platform has built-in hard drives.B The WXC platform has no built-in hard drives.C The WX platform uses Network Sequence Caching technology.D The WXC platform uses the Network Sequence Caching technology

考题 单选题Which statement describes a security zone?()A A security zone can contain one or more interfaces.B A security zone can contain interfaces in multiple routing instances.C A security zone must contain two or more interfaces.D A security zone must contain bridge groups.

考题 单选题A network vulnerability scanner is part of which critical element of network and system security?()A  host securityB  perimeter securityC  security monitoringD  policy management

考题 单选题Which statement correctly describes the disabling of IP TTL propagation in an MPLS network?()A The TTL field from the IP packet is copied into the TTL field of the MPLS label header at the ingress edge LSRB TTL propagation cannot be disabled in an MPLS domainC TTL propagation is only disabled on the ingress edge LSRD The TTL field of the MPLS label header is set to 255E The TTL field of the IP packet is set to 0

考题 单选题One of the most important characteristics of OSPF is Multiple areas. Which statement best describes why this feature is such an important enhancement to earlier routing protocols?()A The network domain, when divided into areas, allows for the use of both IANA classful addressing and private addressing.B The use of multiple areas allows for the use of prioritization.C All computation is kept within the area, with minimum communication between the areas,allowing the network to scale to larger sizes.D It is easier to implement security.

考题 单选题Which statement accurately describes firewall user authentication?()A Firewall user authentication provides another layer of security in a network.B Firewall user authentication provides a means for accessing a JUNOS Software-based security device.C Firewall user authentication enables session-based forwarding.D Firewall user authentication is used as a last resort security method in a network.

考题 单选题Which statement best describes the benefits of Cisco Integrated Services Routers?()A  In a single device,ISRs provide threat defense against attacks from hackers and viruses thatcan occur in the network.B  In a single device,ISRs provide the framework to integrate and extend wired and wirelessnetworks.C  In a single device ISRs provide concurrent security, voice, data, wireless and applicationoptimization services.D  In a single device,ISRs provide the common fabric,functionality,and CLI across the network.

考题 单选题Which statement describes the behavior of a security policy?()A The implicit default security policy permits all traffic.B Traffic destined to the device itself always requires a security policy.C Traffic destined to the device’s incoming interface does not require a security policy.D The factory-default configuration permits all traffic from all interfaces.