考题
Which two functions require the use of the CLI?() (Choose two.)
A. adding a VLANB. adding a clusterC. running a tcpdumpD. adding a target server
考题
Which two functions are performed in Quick Setup?() (Choose two.)
A. operating modeB. auto-deploymentC. speed and duplex settingsD. registration server designation
考题
The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()A、 IPSB、 VPN ConcentratorC、 ACS serverD、 PIX firewallE、 CSA MCF、 DDoS Anomaly Guard and Detector
考题
Which two are correct functions of the Cisco Anomaly Guard and Detector for preventing DDOS attacks? ()A、 uses Netflow data for anomaly detectionsB、 builds baseline profilesof normal operating conditions, enablingrapid identification of unusual activity that indicates an attackC、 accept events inputs from different network devicesvia syslog, SDEE and SNMPD、 dynamic diversion redirects and cleans only traffic destined for targeted devices, allowing unaffectedtraffic toflow freely and ensuring business continuityE、 pushes ACLs to network devices to only block the malicious trafficF、 using topology and configuration awareness, events from different devices are correlatedand attacks mitgitations are performed at the optimal location
考题
Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()A、Cisco Firewall Services Module (FWSM)B、Cisco Secure Access Control Server (ACS)C、Cisco Private Internet Exchange (PIX) FirewallD、Cisco Internetwork Operating System (IOS) Firewall
考题
Which two IntServ functions are required on a router?()A、admission controlB、DSCP classificationC、monitoringD、markingE、scheduling
考题
Which statement regaming high availabily in the Cisco UCS is correct?()A、A node is one of the two(2)CMCsB、A node is one of the two(2)Fabric InterconnectsC、A group is a set off our(4)nodesD、Each group is identified by a floating node ID
考题
Which two statements describe the functions and operations of IDS and IPS systems?()A、A network administrator entering a wrong password would generate a true-negative alarm.B、A false positive alarm is generated when an IDS/IPS signature is correctly identified.C、An IDS is significantly more advanced over IPS because of its ability to prevent network attacks.D、Cisco IDS works inline and stops attacks before they enter the network.E、Cisco IPS taps the network traffic and responds after an attack.F、Profile-based intrusion detection is also known as "anomaly detection".
考题
Which Cisco product is a hardware component that supports content filtering and other gateway security functions for the Catalyst 6500 Series?()A、Cisco Private Internet Exchange (PIX) FirewallB、Cisco VPN/Security Management Solution (VMS)C、Cisco Internetwork Operating System (IOS) FirewallD、Cisco Firewall Services Module (FWSM)
考题
What two features in Cisco switches help prevent Layer 2 loops?()A、UniDirectional Link DetectionB、Hot Standby Router ProtocolC、Virtual Router Redundancy ProtocolD、PortFastE、root guardF、loop guard
考题
Which two statements about Cisco Security Management Suite are correct?()A、It should be implemented in a management VLAN.B、Its connection to managed devices should be over a data VLAN.C、It is made up of Cisco Security MARS and Clean Access software.D、It should be deployed as close to the edge of the network as possible.E、It delivers policy administration and enforcement for the Cisco Self-Defending Network.
考题
Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()A、 Cisco lOS Matrix NavigatorB、 Cisco Feature NavigatorC、 Cisco lOS Package PlannerD、 Cisco lOS Security PlannerE、 Cisco Dynamic Configuration Tool
考题
Which two statements regarding SNMP monitoring of a UCS system are correct?()A、SNMP v3 is supportedB、includes same MIBs as the Cisco Nexus7000C、does not provides MIBs downstream of the fabric interconnectD、includes same MIBs as the Cisco Nexus2000
考题
Which two functions does Cisco Configuration Assistant provide?()A、 device DiscoveryB、 call forwardingC、 call routing configurationD、 command line configurationE、 wireless connectivity
考题
You are the Cisco Network Designer in Cisco.com. Which two statements about Layer 3 access designs are correct?()A、Convergence time is fractionally slower than STP.B、Broadcast and fault domains are increased.C、IP address space is difficult to manage.D、Fast uplink convergence is supported for failover and fallback.
考题
多选题Which two functions does Cisco Configuration Assistant provide?()Awireless connectivityBcall routing configurationCdevice discoveryDcall forwardingEcommand line configuration
考题
多选题Which tools on Cisco.com could you use to plan for correct Cisco lOS images to support a customer’s security design and requirements? (Choose two.)()ACisco lOS Matrix NavigatorBCisco Feature NavigatorCCisco lOS Package PlannerDCisco lOS Security PlannerECisco Dynamic Configuration Tool
考题
多选题The Cisco ASA Security Appliance can offer benefit of integrating which three security services into one device?()AIPSBVPN ConcentratorCACS serverDPIX firewallECSA MCFDDoS Anomaly Guard and Detector
考题
多选题What two features in Cisco switches help prevent Layer 2 loops?()AUniDirectional Link DetectionBHot Standby Router ProtocolCVirtual Router Redundancy ProtocolDPortFastEroot guardFloop guard
考题
多选题For which two functions is the Routing Engine responsible?()Apacket forwardingBqueuing functionsCrouting protocol controlDJUNOS software operation
考题
单选题Which statement regaming high availabily in the Cisco UCS is correct?()A
A node is one of the two(2)CMCsB
A node is one of the two(2)Fabric InterconnectsC
A group is a set off our(4)nodesD
Each group is identified by a floating node ID
考题
多选题Which two statements about Cisco Security Management Suite are correct? ()AIt should be implemented in a management VLAN.BIts connection to managed devices should be over a data VLAN.CIt is made up of Cisco Security MARS and Clean Access software.DIt should be deployed as close to the edge of the network as possible.EIt delivers policy administration and enforcement for the Cisco Self-Defending Network.
考题
多选题Which two functions of the Junos OS are handled by the data plane? ()(Choose two.)ANATBOSPFCSNMPDSCREEN options
考题
多选题Which two are character manipulation functions? ()ATRIMBREPLACECTRUNCDTO_DATEEMODFCASE
考题
多选题Which two functions are performed in Quick Setup?() (Choose two.)Aoperating modeBauto-deploymentCspeed and duplex settingsDregistration server designation
考题
多选题Which two IntServ functions are required on a router?()Aadmission controlBDSCP classificationCmonitoringDmarkingEscheduling
考题
多选题Which two functions require the use of the CLI?() (Choose two.)Aadding a VLANBadding a clusterCrunning a tcpdumpDadding a target server