單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed?()

A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two of these are characteristics of an IDS sensor?()

A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network

3.單項選擇題Which of these terms refers to call issues that cause variations in timing or time of arrival?()

A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio

4.多項選擇題

Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()

A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization

5.單項選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

最新試題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:單項選擇題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:單項選擇題

Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.

題型:單項選擇題

What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

題型:單項選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項選擇題