网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Cisco Clean Access ensures that computers connecting to your network have which of the following?()
A

 No vulnerable applications or operating systems

B

 No viruses or worms

C

 Appropriate security applications and patch levels

D

 Current IPS signatures

E

 Cisco Security Agent


参考答案

参考解析
解析: 暂无解析
更多 “单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()A  No vulnerable applications or operating systemsB  No viruses or wormsC  Appropriate security applications and patch levelsD  Current IPS signaturesE  Cisco Security Agent” 相关考题
考题 Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A. Source IP and browserB. Source IP and certificateC. Certificate and Host CheckerD. Host Checker and source IP

考题 You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()A.AB.BC.CD.D

考题 You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?() A.5B.10C.14D.20

考题 You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A、5B、10C、14D、20

考题 Cisco Clean Access ensures that computers connecting to your network have which of the following?()A、 No vulnerable applications or operating systemsB、 No viruses or wormsC、 Appropriate security applications and patch levelsD、 Current IPS signaturesE、 Cisco Security Agent

考题 Which of the following of a component of the Cisco SMB Support Assistant?()A、SupportFor Every TechnologyB、Cisco IOS Bug FixesC、Access to theSoftware CenterD、Full Access to the Cisco.com website

考题 A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()A、known internalB、managedC、friendlyD、known external

考题 From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()A、 extends networkQoS throughout the networkB、 simplifies management of central or remotely locates access pointsC、 ensures implementation of the most recent security protocolsD、 streamlines wireless LAN managementE、 extends features for optical traffic network services

考题 Cisco SMARTnet maintains the operational health of your network through Cisco expertise and resources that promote greater uptime and extend the value of your IT investment. Which serviceis provided by Cisco SMARTnet?()A、 upgrade discountsB、 Free CCO accountC、 Cisco Learning CreditsD、 around-the-clock access toCisco Technical Access Center

考题 Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

考题 Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()A、 Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layerB、 Provides host-level redundancy by connecting each end device to 2 separate Access switches C、 Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRPD、 Include a link between two Access switches to support summarization of routing information

考题 Which two statements about Cisco Security Management Suite are correct?()A、It should be implemented in a management VLAN.B、Its connection to managed devices should be over a data VLAN.C、It is made up of Cisco Security MARS and Clean Access software.D、It should be deployed as close to the edge of the network as possible.E、It delivers policy administration and enforcement for the Cisco Self-Defending Network.

考题 As customers deploy converged services across the business infrastructure, access routers must integrate security services and IP communications. Which router series extends intelligent networking to remote branches and offices?()A、 Cisco 700 Series ISDN Access RoutersB、 Cisco Integrated Services RoutersC、 Cisco 3700 Series Multiservice Access RoutersD、 Cisco 1700 Series Modular Access Routers

考题 Which series of Cisco routers is suitable for small businesses and for connecting small offices to enterprise networks?()A、 Cisco 800 Series routersB、 Cisco 830 Series routersC、 Cisco 1700 Series Modular Access RoutersD、 Cisco 3700 Series Modular Access Routers

考题 Your company uses Network Access Protection (NAP) to enforce policies on client computers taht connect to the network. Client computers run Windows Vista. A Group Policy is used to configure client computers to obtain updates from WSUS. Company policy requires that updates labeled important and Critical must be applied before client computers can access network resources. You need to ensure that client computers meet the company policy requirement. What should you do()A、 Enable automatic updates on each clientB、 enable the Security Center on each clientC、 Quarantine clients that do nto have all availible security updates installedD、 Disconnect the remote connection until the required updates are installed.

考题 单选题You are a help desk technician for your company. Your company’s network includes an Active Directory domain and Windows XP Professional computers that are configured as members of the domain. Company policy prohibits users from accessing their computers unless they are authenticated by a domain controller. However, users report that they can log on to their computers, even though a network administrator has told them that a domain controller is not available. As a test, you log off of your computer and disconnect it from the network. You discover that you can log on by using your domain user account. You need to ensure that users cannot access their computers unless they are authenticated by a domain controller. How should you configure the local computer policy on these computers? ()A Enable the Require domain controller to unlock policy.B Set the Number of previous logons to cache policy to 0.  C Remove all user and group accounts from the Log on locally user right. D Remove all user and group accounts from the Access this computer from the network user right. 

考题 单选题You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()A 5B 10C 14D 20

考题 单选题All client computers on your company network run Windows XP and are members of an Active Directory Domain Services domain. You plan to migrate all computers to Windows 7. You also plan to deploy a new VPN server to support remote network access for the computers. You need to ensure that all computers will be supported for remote access during the migration to Windows 7. What should you do?()A Set the VPN server to Layer 2 Tunneling Protocol.B Set the VPN server to Secure Socket Tunneling Protocol.C Set the VPN server to Internet Key Exchange version 2.D Configure the Direct Access feature on the VPN server.

考题 单选题Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()A  Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.B  Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.C  Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.D  Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

考题 多选题Which two statements about Cisco Security Management Suite are correct? ()AIt should be implemented in a management VLAN.BIts connection to managed devices should be over a data VLAN.CIt is made up of Cisco Security MARS and Clean Access software.DIt should be deployed as close to the edge of the network as possible.EIt delivers policy administration and enforcement for the Cisco Self-Defending Network.

考题 单选题As customers deploy converged services across the business infrastructure, access routers must integrate security services and IP communications. Which router series extends intelligent networking to remote branches and offices?()A  Cisco 700 Series ISDN Access RoutersB  Cisco Integrated Services RoutersC  Cisco 3700 Series Multiservice Access RoutersD  Cisco 1700 Series Modular Access Routers

考题 单选题Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()A Source IP and browserB Source IP and certificateC Certificate and Host CheckerD Host Checker and source IP

考题 单选题When you access the Cisco CRS Administration page for the first time in a cluster, the system automatically initiates the cluster setup procedure. You perform this procedure one time for a cluster. Whatdo you accomplish in this procedure?()A identify your Cisco CRS license files and location, enter information about your LDAP, and designate a Cisco CRS administrator B identify CSQs and JTAPI user and designate a Cisco CRS administrator C identify resources and RM user and enter information about your LDAP D identify your Cisco CRS license files and location, enter information about your LDAP, and designate IPCC Express resources 

考题 单选题Which series of Cisco routers is suitable for small businesses and for connecting small offices to enterprise networks?()A  Cisco 800 Series routersB  Cisco 830 Series routersC  Cisco 1700 Series Modular Access RoutersD  Cisco 3700 Series Modular Access Routers

考题 单选题A rogue access point is detected on the cisco wcs consolE. upon investigation,the access point is discovered to belong to a neighboring business. Your administrator should designate the rogue access point as which of the following?()A known internalB managedC friendlyD known external

考题 单选题Cisco SMARTnet maintains the operational health of your network through Cisco expertise and resources that promote greater uptime and extend the value of your IT investment. Which serviceis provided by Cisco SMARTnet?()A  upgrade discountsB  Free CCO accountC  Cisco Learning CreditsD  around-the-clock access toCisco Technical Access Center

考题 多选题You are the network administrator for your company. All servers run Windows Server 2003.   You configure the Routing and Remote Access service on a server named Server2. Server2 is connected to a modem pool and supports eight simultaneous inbound connections. You instruct remote users to dial in to Server2 from their home computers.The company’s written business policy states that the only client computer operating systems that should be supported for dial-up access are Windows 95, Windows 98, Windows 2000 Professional, and Windows XP Professional.You need to configure the remote access policy to support the most secure authentication methods possible. You want to enable only the necessary authentication methods based on the supported client computers that will be connecting.   Which authentication method or methods should you enable?()APAPBSPAPCCHAPDMS-CHAP Version 1EMS-CHAP Version 2