A.a detailed physical and logical topology
B.a cost analysis of the implemented solution
C.detailed logs from the AAA and SNMP servers
D.results from audit testing of the implemented solution
您可能感興趣的試卷
你可能感興趣的試題
A.having alternative addressing and VLAN schemes
B.having a rollback plan in case of unwanted or unexpected results
C.running a test script against all possible security threats to insure that the solution will mitigate all potential threats
D.isolating and testing each security domain individually to insure that the security design will meet overall requirements when placed into production as an entire system
A.a list of existing network applications currently in use on the network
B.network audit results to uncover any potential security holes
C.a planned Layer 2 design solution
D.a proof-of-concept plan
E.device configuration templates
A.detailed list of personnel assigned to each task within the plan
B.a Layer 2 spanning tree design topology
C.rollback guidelines
D.placing all unused access ports in VLAN 1 to proactively manage port security
E.enabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis
A.detailed VLAN information
B.an incident response plan
C.results of testing the new network configuration
D.an existing hierarchical network topology
E.a security policy for your organization
You are tasked with designing a security solution for your network.
What information should be gathered prior to designing the solution?()
A.a list of applications currently in use in the network
B.IP addressing design plans so that the network can be appropriately segmented to mitigate potential network threats
C.detailed security device specifications
D.results from pilot network testing
最新試題
Refer to the exhibit. What will happen when one more user is connected to interface FastEthernet 5/1? ()
What will occur when a nonedge switch port that is configured for Rapid Spanning Tree does not receive a BPDU from its neighbor for three consecutive hello time intervals?()
Refer to the exhibit. Switch 15 is configured as the root switch for VLAN 10 but not for VLAN 20. If the STP configuration is correct, what will be true about Switch 15?()
During routine maintenance, G1/0/1 on DS1 was shutdown. All other interface were up. DS2 became the active HSRP device for Vlan101 as desired. However, after G1/0/1 on DS1 was reactivated. DS1 did not become the active HSRP device as desired. What need to be done to make the group for Vlan101 function properly ? ()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()
What two things will occur when an edge port receives a BPDU?()
Which router redundancy protocol cannot be configured for interface tracking?()
Which statement is correct about RSTP port roles?()
Refer to the exhibit. For what purpose is the command show ip cef used?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()