單項(xiàng)選擇題Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()

A. CiscoWorks Security Device Management Center (SD/MC)
B. Security Device Manager (SDM)
C. Adaptive Security Device Manager (ASDM)
D. CiscoWorks VMS/Management Center (VMS/MC)


您可能感興趣的試卷

你可能感興趣的試題

3.單項(xiàng)選擇題Which of these best describes the Cisco Lifecycle Services approach? ()

A. a methodology for proactively updating equipment before it reaches the end of its life
B. a methodology for introducing new technologies
C. a methodology for creating a business plan
D. a methodology for determining total cost or ownership

5.單項(xiàng)選擇題At which stage of the Cisco Lifecycle Services approach would you test for system acceptance?()

A. Preparation
B. Planning
C. Design
D. Implementation
E. Operation
F. Optimization

最新試題

Which component of Cisco ASDM provides administrators with a complete system overview and device health statistics at a glance?()

題型:?jiǎn)雾?xiàng)選擇題

The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()

題型:多項(xiàng)選擇題

Which two of these statements best describe fast secure roaming? (Choose two.)()  

題型:多項(xiàng)選擇題

What are three advantages of the Cisco Integrated Services Pouter product family? (Choose three.) ()

題型:多項(xiàng)選擇題

Deploying ISRs with integrated security services can help lower the total cost of ownership. Which of these Cisco ISR Routers features illustrate this point?()

題型:?jiǎn)雾?xiàng)選擇題

What is the purpose of the Dynamic Configuration Tool?  ()

題型:?jiǎn)雾?xiàng)選擇題

List three benefits of implementing an integrated security solution based on the Cisco Self- Defending Network strategy? (Choose three.)()

題型:多項(xiàng)選擇題

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()

題型:多項(xiàng)選擇題

Cisco ASDM provides 16 different graphs the help identify security risks by displaying data aboutpotentially malicious activity. What is one kind of data these graphs show? ()

題型:?jiǎn)雾?xiàng)選擇題

Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()

題型:多項(xiàng)選擇題