A. 48 Ethernet 10/100 ports
B. Fast Ethernet and Gigabit Ethernet connectivity
C. dual-purpose copper or fiber uplinks
D. standalone fixed-configuration Layer 2 switching
您可能感興趣的試卷
你可能感興趣的試題
A. security contexts
B.- transparent firewall
C. WebVPN
D. Active/Active failover
E. low latency queuing
F. AIP-SSM intrusion prevention
A. the large enterprise with a global presence
B. the large enterprise with a single campus
C. the small- or medium-sized business
D. All companies, regardless of size
Which two methods enable a PC connected to the PartnerNet to connect to a server on DMZ1 but deny it access to both DMZ2 and the Inside network? (Choose two.)()
A. Enable port address translation for traffic sourced from the PartnerNet PC to the DMZ1 server.
B. Disable NAT control on DM72 and the Inside interfaces only.
C. Enable static NAT translation for the DMZ1 server, and then use an ACL to permit the PartnerNet PC traffic to the DMZ1 server.
D. Disable NAT control on the DMZ1 interface only.
E. Lower the security level of the DMZ2 interface to 30.
F. Raise the security level of the PartnerNet interface to 55.
A. 10.0.0.0/24
B. 10.0.0.0/16
C. 10.0.0.0/14
D. 10.0.0.0/15
A. CiscoView
B. Resource Manager Essentials
C. Device Fault Manager
D. Campus Manager
最新試題
Which item is a feature of Cisco Compatible Extensions, Version 3? ()
A customer needs approximately 15 to 20 wireless APs for RF coverage. Given that the customer is going to use the 1010 light weight AP with the advanced feature set, what other product is required to complete this operational functionality? ()
Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft? ()
Which of these is a benefit of an integrated security management system? ()
Which two of these statements best describe fast secure roaming? (Choose two.)()
At which stage of the Cisco Lifecycle Services approach would you test for system acceptance?()
Cisco ISP Routers offer which three of these security benefits? (Choose three.) ()
What is one reason you might recommend a solution using only autonomous access points to a customer? ()
Cisco ASDM provides 16 different graphs the help identify security risks by displaying data aboutpotentially malicious activity. What is one kind of data these graphs show? ()
At which stage of the Cisco Lifecycle Services approach should customer education presentations occur? ()