网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
A
VLAN
B
Peer to Peer
C
VTP
D
VPN
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A VLANB Peer to PeerC VTPD VPN” 相关考题
考题
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()
A.VLANB.Peer to PeerC.VTPD.VPN
考题
An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A. NATB. WPSC. MAC filteringD. Port forwarding
考题
Which of the following describes a secure connection over the Internet between two sites?()
A. FTPB. VLANC. VPND. HTTP
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()
A. Track DHCP distributionB. Compare MAC and IP addressesC. Document Internet access historyD. Identity network devices
考题
Which of the following network topologies BEST describes a VPN? ()(Select TWO)
A. Point to PointB. Point to MultipointC. VLAND. RingE. Bus
考题
A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network.
A.encodedB.encryptedC.storedD.transmitted
考题
Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A、VLANB、Peer to PeerC、VTPD、VPN
考题
Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A、 ARPB、 DMZC、 VLAND、 VPN
考题
Which of the following describes a secure connection over the Internet between two sites?()A、FTPB、VLANC、VPND、HTTP
考题
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()A、IPSecB、IPSec with GREC、DMVPND、EZVPNE、all of the choices
考题
You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.
考题
You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()A、Take no action, you have achieved your goal.B、Implement a Cisco Secure IPS sensor.C、Implement a protected port on the access switches.D、Implement 802.1X on the switch ports.
考题
Office A is located 500 miles (805 kilometers) away from Office B, yet they are on the same private network. Which of the following is MOST likely being used to accomplish this scenario?()A、TrunkingB、LANC、VPND、Peer to peer
考题
Which of the following network topologies BEST describes a VPN? ()(Select TWO)A、Point to PointB、Point to MultipointC、VLAND、RingE、Bus
考题
Physical and logical network diagrams are used for which of the following configuration management goals?()A、Track DHCP distributionB、Compare MAC and IP addressesC、Document Internet access historyD、Identity network devices
考题
An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A、NATB、WPSC、MAC filteringD、Port forwarding
考题
单选题You are charges with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side,which of the following actionsshould you perform on the wired infrastructure?()A
Take no action, you have achieved your goal.B
Implement a Cisco Secure IPS sensor.C
Implement a protected port on the access switches.D
Implement 802.1X on the switch ports.
考题
单选题An ISP has provided a DSL Internet connection with a static IP address. A technician is setting up a small office home office (SOHO) wireless router and needs to provide Internet access to five PCs on the network. Which of the following should be enabled?()A
NATB
WPSC
MAC filteringD
Port forwarding
考题
单选题Which protocol should be used to establish a secure terminal connection to a remote network device?Select the best response.()A
ARPB
SSHC
TelnetD
WEPE
SNMPv1F
SNMPv2
考题
单选题Which of the following logical network topologies is used to provide a secure connection acrossthe Internet?()A
VLANB
Peer to PeerC
VTPD
VPN
考题
多选题Which of the following network topologies BEST describes a VPN? ()(Select TWO)APoint to PointBPoint to MultipointCVLANDRingEBus
考题
单选题Which of the following technologies allows multiple logical subnets to span an entire physical switched network?()A
ARPB
DMZC
VLAND
VPN
考题
单选题A VPN connection is not working correctly and the technician is unable to ping the VPN server. Which of the following actions should the technician do FIRST?()A
Call their local ISPB
Verify the IP information of the serverC
Check their local Internet connectionD
Verify the hostname of the server
考题
单选题Which of the following describes a secure connection over the Internet between two sites?()A
FTPB
VLANC
VPND
HTTP
考题
单选题Physical and logical network diagrams are used for which of the following configuration management goals?()A
Track DHCP distributionB
Compare MAC and IP addressesC
Document Internet access historyD
Identity network devices
考题
单选题It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()A
IPSecB
IPSec with GREC
DMVPND
EZVPNE
all of the choices
考题
单选题You are charged with implementing a secure wireless installation which will provide Internet access to clientdevices but will not allow communications between wireless clients. In addition to implementing PSPF orpeer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wiredinfrastructure?()A
Take no action, you have achieved your goal.B
Implement a Cisco Secure IPS sensor.C
Implement a protected port on the access switches.D
Implement 802.1X on the switch ports.
考题
单选题Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()A
MeshB
BusC
RingD
Star
热门标签
最新试卷