A.RIP
B.EIGRP
C.OSPF
D.Static and default routes
您可能感興趣的試卷
你可能感興趣的試題
A.Voice Traffic uses Assured Forwarding
B.Voice Signaling traffic uses Assured Forwarding
C.Voice Signaling traffic uses priority queuing
D.Voice Traffic uses priority queuing
E.Voice signaling traffic should use priority queuing with Assured Forwarding
A.They are separate from the central site and use NAT to route through the Internet to the Central Site
B.They are part of the VLANs at the Central Site; they are in the same subnets
C.They use public IP Addresses that are routable through the Internet
D.They are in separate subnets but are part of the private address space of the network
A.Metro Ethernet
B.DSL
C.VPN
D.Cable
E.Frame-Relay
A.Frame-Relay
B.Leased Line
C.MPLS
D.DSL
E.Cable
F.Wireless
You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()
A.Disabling HTTPS access to Cisco SDM
B.Prohibiting console access to Router
C.Preventing any alterations to the router’s running configuration
D.Disabling all vulnerable Services on the Router
E.Shutting down all the router’s interfaces
A.To protect the network in case someone inadvertently creates a physical loop in it
B.To ensure that if a device fails another device automatically take over for it
C.To allow management of all network devices
D.To aggregate logical network groups together at one central point
A.The Cisco Control VLAN carries only Layer 2 control traffic
B.802.1Q trunking is used between the access switch and the router
C.There is no 802.1Q trunking used in these designs
D.When 802.1Q trunks are configured, they are also called Native VLANs
E.Trunking Ensures that traffic from only one VLAN is carried on that trunk
Please study the exhibit.Which Cisco SDM configuration task is used to enable the translation of the inside network private IP address to the public IP address?()
A.Firewall and ACL
B.NAT
C.Routing
D.Interface and connections
E.VPN
F.Security Audit
最新試題
When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()
To protect the network from external and internal threats, where should Cisco IPS be enabled on an ISR?()
When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. From this Cisco SDM security Audit Wizard screen, what should you do to secure the Router?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()
What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. In a Cisco Single-Site Secure Network Foundation implementation, which factor affects your choice of switch Configuration?()
Which WAN connection requires a different interface than the standard interface provided in the Cisco Single-Site Secure Network Foundation deployment design?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which Cisco SDM configuration task would you select to configure a static route to the Service Provider?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()