多項(xiàng)選擇題When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()

A.Duplex mode selections
B.Auto MDIX selections
C.Status Selections
D.Group mode selections
E.Port security selections


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題Your Customer has 21 users, each requiring both PC and IP Phone connectivity. Which is the correct configuration for this customer?()

A.1 Cisco 2811 ISR,1 Catalyst Express 500G-12TC,2 Catalyst Express 500-24PC
B.1 Cisco 2851 ISR, Catalyst Express 500G-12TC,3 catalyst Express 500-24PC
C.1 Cisco 2821 ISR,Catalyst Express 500G-12TC,2 Catalyst Express 500-24PC
D.1 Cisco 2801 ISR,1 Catalyst Express 500-24PC

2.單項(xiàng)選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. What does "locking Down" the router entail?()

A.Disabling HTTPS access to Cisco SDM
B.Prohibiting console access to Router
C.Preventing any alterations to the router’s running configuration
D.Disabling all vulnerable Services on the Router
E.Shutting down all the router’s interfaces

3.單項(xiàng)選擇題When determining a customer’s technical requirements for a Cisco Unified Communications solution, which important tool can be used to determine the bandwidth used by different codecs with various protocols over different media?()

A.Network Codec Aggregator Tool
B.Bandwidth Estimator Tool
C.Unified Communication Bandwidth Tool
D.Voice Bandwidth Calculator
E.Voice Codec Bandwidth Calculator

4.多項(xiàng)選擇題

Please study the exhibit.What are two options available when using the Security Audit Configuration task in Cisco SDM?()

A.Perform a One-step lockdown on the Router
B.Perform a Virus Scan
C.Perform a Secure audit on the Router
D.Perform a Denial Of Service attack on the Router to verify that it is protected
E.Perform a real-time inspection of incoming traffic destined for the router

最新試題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. The exhibit is an example of which technology being implemented?()

題型:?jiǎn)雾?xiàng)選擇題

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()

題型:?jiǎn)雾?xiàng)選擇題

What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()

題型:?jiǎn)雾?xiàng)選擇題

Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()

題型:多項(xiàng)選擇題

When determining a customer’s security requirements using the security site survey from the steps for success methodology, which three of theses should be included in the customer’s security policy and procedures?()

題型:多項(xiàng)選擇題

Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()

題型:?jiǎn)雾?xiàng)選擇題

To protect the network from external and internal threats, where should Cisco IPS be enabled on an ISR?()

題型:?jiǎn)雾?xiàng)選擇題

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested network security mechanisms. You are required to match the correct mechanism with the proper description.

題型:?jiǎn)柎痤}

Which two statements correctly identify factors to consider when Configuring WAN QoS?()

題型:多項(xiàng)選擇題

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested in SMB wireless solutions. You are required to produce the correct order for performing a Technology Strategy Development. Choose only steps that apply.

題型:?jiǎn)柎痤}