問(wèn)答題

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested in SMB wireless solutions. You are required to produce the correct order for performing a Technology Strategy Development. Choose only steps that apply.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()

A.The names of the VLANs used by the SmartPorts are case insensitive
B.The ports may belong to a configurable data VLAN
C.The names of the VLANs used by the Smartports are not relevant
D.The ports may belong to many VLANs, depending on how many PCs are connected to each port.
E.The names of the VLANs used by the Smartports are case sensitive

2.單項(xiàng)選擇題Which statement correctly describes network security settings in Cisco Network Assistant for the Catalyst Express 500 Switch?()

A.The LOW setting enables broadcast storm control, but has no effect on the number of devices that can connect to a switch port
B.The LOW setting enables broadcast storm control and limits the number of devices that can connect to a switch port.
C.The LOW setting disables broadcast storm control but limits the number of devices that can connect to a switch port
D.The default network setting is "HIGH"

3.多項(xiàng)選擇題When resetting a Catalyst Express switch to factory default settings, which three options are available from the Software Recovery window?()

A.Boot to a password recovery window
B.Boot with the factory default image
C.Erase the system configuration and boot with the factory default IOS image
D.Erase the system configuration and boot from a TFTP-supplied IOS image
E.Erase the System Configuration

最新試題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which two interfaces are enabled for 802.1Q encapsulation?()

題型:多項(xiàng)選擇題

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

題型:多項(xiàng)選擇題

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested network security mechanisms. You are required to match the correct mechanism with the proper description.

題型:?jiǎn)柎痤}

In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()

題型:多項(xiàng)選擇題

To protect the network from external and internal threats, where should Cisco IPS be enabled on an ISR?()

題型:?jiǎn)雾?xiàng)選擇題

Your Customer has 21 users, each requiring both PC and IP Phone connectivity. Which is the correct configuration for this customer?()

題型:?jiǎn)雾?xiàng)選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. From this Cisco SDM security Audit Wizard screen, what should you do to secure the Router?()

題型:?jiǎn)雾?xiàng)選擇題

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()

題型:?jiǎn)雾?xiàng)選擇題

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested in WAN devices. Match the appropriate WAN device with the correct description.

題型:?jiǎn)柎痤}

What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()

題型:?jiǎn)雾?xiàng)選擇題