网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which deployed VoWLAN client security option is recommended by Cisco?()
A
Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication
B
Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through
C
Layer 3 with Layer 3 Security set to VPN Pass-Through
D
Layer 2 with Layer 2 Security set to 802.1X
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which deployed VoWLAN client security option is recommended by Cisco?()A Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC Layer 3 with Layer 3 Security set to VPN Pass-ThroughD Layer 2 with Layer 2 Security set to 802.1X” 相关考题
考题
You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)
A. [edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }B. [edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }C. [edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }D. [edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
考题
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
A. A client group is a list of clients associated with a group.B. A client group is a list of groups associated with a client.C. Client groups are referenced in security policy in the same manner in which individual clients are referenced.D. Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
考题
Refer to the exhibit. Which recommended practice is applicable?()
A. If no core layer is deployed, the design will be easier to scale.B. If no core layer is deployed, there will be fewer cabling requirements.C. If no core layer is deployed, the distribution switches should not be fully meshed.D. A dedicated campus core layer is not needed for connecting fewer than five buildings.E. A dedicated campus core layer should be deployed for connecting three or more buildings.
考题
In a VoWLAN deployment, It is recommended()dBm separation between cells with the same channel.
A.6B.7C.10D.19
考题
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)A、A client group is a list of clients associated with a group.B、A client group is a list of groups associated with a client.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
考题
Which two pieces of information does the Cisco WLC v5.2 client monitor feature provide about a VoWLAN client?()A、RSSI of the client at the access pointB、WMM stateC、current MOS valueD、current RF channelE、current transmit data rate
考题
Which two firewall user authentication objects can be referenced in a security policy?()A、access profileB、client groupC、clientD、default profile
考题
Which option provides a hierarchy of data security across lines of business?()A、AlertsB、Multi-OrgC、FlexfieldsD、Shared entitiesE、Business Intelligence
考题
After a client has developed a security policy, what is recommended that they do next?()A、monitor and respondB、analyze and improveC、secure the networkD、test the system
考题
Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A、 Cisco Integrated Service RoutersB、 Cisco ASA 5500 Series Security ApplianceC、 CiscoWebVPN Services ModuleD、 CiscoIPsec VPN Module
考题
What is a virtual firewall?()A、another name for a firewall deployed in routed modeB、another name for a firewall deployed in transparent modeC、a separation of multiple firewall security contexts on a single firewallD、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
考题
If the VoWLAN client is a Vocera badge, which Cisco WLC parameter needs to be changed from the default value?()A、DTIMB、Ethernet multicast modeC、peer-to-peer block modeD、RF group modeE、DTPC
考题
Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A、 Security ControlsB、 Database AccessC、 Set Security ProfileD、 Authorize Group Reassignment
考题
Which two statements regarding firewall user authentication client groups are true?()A、Individual clients are configured under client groups in the configuration hierarchy.B、Client groups are configured under individual clients in the configuration hierarchy.C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
考题
You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader. Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced. Which three actions should you perform?() A、Select the Advanced (custom settings) security option.B、Select the Require data encryption check box. C、Select the Typical (recommended settings) security option. D、Select the Use smart card item from the Validate my identity as follows list.E、Select the Maximum strength encryption item from the Data encryption list.F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.
考题
You work as the exchange administrator at TestKing.com. The TestKing.com network contains two ActiveDirectory sites named TestKing1 and TestKing2. TestKing1 and TestKing2 are connected to each other bymeans of a WAN link. You receive notification during the day to plan the deployment of two Exchange Server 2010 Mailbox servers and two Client Access servers at TestKing1 and TestKing2. Every site will include a Client Accessarray. You are instruced to recommend a solution in order to deploy the Hub Transport servers. You have tomake sure that e-mail messages will be delivered to users in other sites if a Hub Transport server shouldbe fail. Your solution should also reduce the amount Exchange servers being deployed as well as supportthe deployment of the Client Access array. What should you do? ()A、Your best option would be ensure that two Hub Transport severs are deployed on two new servers in TestKing1 and TestKing2.B、Your best option would be add the Hub Transport server role to all Mailbox servers.C、Your best option would be to ensure that a Hub Transport server is deployed on a new server.Thereafter the SMTP service should be installed on every Client Access server.D、Your best option would be to add the Hub Transport server role to every Client Access server.
考题
单选题Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()A
Cisco Integrated Service RoutersB
Cisco ASA 5500 Series Security ApplianceC
CiscoWebVPN Services ModuleD
CiscoIPsec VPN Module
考题
单选题Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()A
Security ControlsB
Database AccessC
Set Security ProfileD
Authorize Group Reassignment
考题
单选题Which option provides a hierarchy of data security across lines of business?()A
AlertsB
Multi-OrgC
FlexfieldsD
Shared entitiesE
Business Intelligence
考题
单选题What is a virtual firewall?()A
another name for a firewall deployed in routed modeB
another name for a firewall deployed in transparent modeC
a separation of multiple firewall security contexts on a single firewallD
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per contextE
a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
考题
单选题You are the network administrator for ExamSheet.net. You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly. You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()A
Modify the GPO to change the Driver Signing option. B
Run theSigverifcommand on each client computer.C
Reconfigure the Driver Signing option on each client computer. Install the driver on each client computer. Reapply the security template settings on each client computer.D
Modify the Hisecws.inf security template on each client computer to change the Driver Signing option.E
Modify the Hisecws.inf security template on the domain controller to change the Driver Signing option.
考题
单选题Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network. What should you do? ()A
Set the security type to the No authentication (Open) option.B
Configure the wired and wireless network adapters as a network bridge.C
Modify the wireless network profile type to the Use all-user profiles only (recommended) option.D
On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
考题
多选题Which two statements regarding firewall user authentication client groups are true?() (Choose two.)AA client group is a list of clients associated with a group.BA client group is a list of groups associated with a client.CClient groups are referenced in security policy in the same manner in which individual clients are referenced.DClient groups are used to simplify configuration by enabling firewall user authentication without security policy.
考题
多选题You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)A[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }B[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }C[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }D[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
考题
单选题Which deployed VoWLAN client security option is recommended by Cisco?()A
Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB
Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC
Layer 3 with Layer 3 Security set to VPN Pass-ThroughD
Layer 2 with Layer 2 Security set to 802.1X
考题
多选题Which three statements are true about load-based Call Admission Control?()Agrants a VoWLAN client-initiated call based on the number of active clients associated to the accesspointBgrants a VoWLAN client-initiated call based on channel bandwidth capacityCuses the 802.11i specificationDuses 802.11 action framesErequires a WMM-enabled client
考题
多选题Which two pieces of information does the Cisco WLC v5.2 client monitor feature provide about a VoWLAN client?()ARSSI of the client at the access pointBWMM stateCcurrent MOS valueDcurrent RF channelEcurrent transmit data rate
考题
单选题If the VoWLAN client is a Vocera badge, which Cisco WLC parameter needs to be changed from the default value?()A
DTIMB
Ethernet multicast modeC
peer-to-peer block modeD
RF group modeE
DTPC
热门标签
最新试卷