單項選擇題Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

A. NAC can authenticate using 802.1X and IBNS cannot
B. NAC can ensure only compliant machines connect and IBNS cannot
C. NAC can ensure access to the correct network resources and IBNS cannot
D. NAC can manage user mobility and reduce overhead costs and IBNS cannot


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()

A. Layer 2
B. Layer 3
C. in-band
D. out-of-band
E. edge
F. central

3.單項選擇題Which of these recommended designs provides the highest availability?()

A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

4.單項選擇題Which of these is a correct description of SSO?()

A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.

5.單項選擇題Which of these statements is correct regarding SSO and Cisco NSF?()

A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than onesecond.
E. NSF and SSO with redundant supervisors have the most impact on outages at the accesslayer.

最新試題

Which statement about data center access layer design modes is correct?()

題型:單項選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項選擇題

What are two characteristics of the SLB One-arm mode? ()

題型:多項選擇題

What are two characteristics of GSS? ()

題型:多項選擇題

Which two statements about FCIP and iSCSI are correct?()

題型:多項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項選擇題

Which two of these correctly describe asymmetric routing and firewalls? ()

題型:多項選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:單項選擇題