网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
A

 Spanning tree protect

B

 Root Guard and BPDU Guard

C

 Unicast Reverse Path Forwarding

D

 MAC spoof guard

E

 Port Security


参考答案

参考解析
解析: 暂无解析
更多 “单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A  Spanning tree protectB  Root Guard and BPDU GuardC  Unicast Reverse Path ForwardingD  MAC spoof guardE  Port Security” 相关考题
考题 A computer’s case fan protects against which of the following environmental concerns?() A. PressureB. HeatC. Brown outD. Cold

考题 As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology.What is most probably the reason for that?()A. Content pre-positioningB. Automatic discovery of Cisco WAEsC. Comprehensive logs, reports, and graphsD. Remote scheduling of software distribution

考题 Chafing gear ______.A.reduces and prevents corrosion of standing riggingB.prevents corrosion of running riggingC.reduces and prevents wear caused by the rubbing of one object against anotherD.protects the body against extreme cold

考题 What can you install on IPCC Express to protect against worms, zero-day viruses, and other immediate security threats?()A、Microsoft Management Console  B、Cisco Security Agent (headless agent)  C、Cisco Security Agent Management Center  D、Microsoft SQL Server 2000

考题 What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()A、To protect the network in case someone inadvertently creates a physical loop in itB、To ensure that if a device fails another device automatically take over for itC、To allow management of all network devicesD、To aggregate logical network groups together at one central point

考题 Which statement is true about the Cisco Self-Defending Network?()A、The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB、The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC、The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD、The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation

考题 You are Cisco Channel Partner Account Manager. Which service component within the preparephase recommends the appropriate technology strategy to address a business requirement of the customer?()A、 finding out what a customer requires from a proposed solutionB、 analyzes the customer’s business requirements and recommends the appropriate Cisco technologies to meet business requirementsC、 finding out what end-user training a customer requiresD、 finding out a customer’s physical requirements

考题 Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention?()A、Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.B、UDLD protects against STP failures caused by cabling problems that create one-way links.C、Loop guard detects and protects against duplicate packets being received and transmitted on different ports.D、UDLD protects against unidirectional cabling problems on copper and fiber media.E、Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

考题 What is the purpose of Dual Ring Interconnect with D C for SDH rings?()A、Protects signals when a ring switch failsB、Protects signals when multiple span switches failC、Protects pre-emptible traffic from being dropped when a ring switch occursD、Protects signals against any combination of link failure in each ring

考题 What are two benefits of control plane policing?()A、protection against denial of service (DoS) attacks at infrastructure routers and switchesB、 protection against known worm attacks in routers and switchesC、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesD、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesE、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches

考题 What Cisco technology protects against Spanning-Tree Protocol manipulation?()A、 Spanning tree protectB、 Root Guard and BPDU GuardC、 Unicast Reverse Path ForwardingD、 MAC spoof guardE、 Port Security

考题 Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A、 Cisco Trust AgentB、 Cisco Self-Defending NetworkC、 Cisco Secure Access ControlD、 Cisco Network Admission Control

考题 What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)A、It provides multiprotocol support.B、It provides improved availability, strong security, and business continuance measures.C、It enables you to connect Cisco VSAN technology and DAS technology.D、It reduces cost and complexity by providing an easy transition to evolving technologies.E、It allows you to create separate networks on the VSAN.F、It allows you to migrate to new technologies without a complete equipment upgrade.

考题 What Cisco Switch feature best protects against CAM table overflow attacks?()A、 Storm ControlB、 Port securityC、 CAM table size definitionD、 IP spoof preventionE、 Network Based Application Recognition

考题 What are two characteristics of dual-ring interconnect in SDH networks? ()A、 It protects signals against node failures between rings.B、 It protects signals against node failure within a single ring.C、 It allows for traffic to be preempted when a ring switch occurs.D、 Traffic can be dropped and continued at interconnecting nodes.E、 It protects preemptible traffic from being dropped when a ring switch occurs.

考题 What is the next state of initial in spanning-tree protocol?

考题 What are three key differences between the Cisco and Cisco Small Business product portfolios?()A、service and support optionsB、appeal to expanding businessesC、ease of useD、device management optionsE、ramp-up time for technology integration

考题 单选题As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology. What is most probably the reason for that?()A Content pre-positioningB Automatic discovery of Cisco WAEsC Comprehensive logs, reports, and graphsD Remote scheduling of software distribution

考题 单选题A motor enclosure which protects against falling liquids is classified as ()A waterproofB drip proofC spray tightD spray proof

考题 多选题Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()ALoop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotBUDLD protects against STP failures caused by cabling problems that create one-way links.CLoop guard detects and protects against duplicate packets being received and transmitted on different portsDUDLD protects against unidirectional cabling problems on copper and fiber media.ELoop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.

考题 多选题What are two benefits of control plane policing?()Aprotection against denial of service (DoS) attacks at infrastructure routers and switchesBprotection against known worm attacks in routers and switchesCquality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesDquality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesEquality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches

考题 单选题Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A  Cisco Trust AgentB  Cisco Self-Defending NetworkC  Cisco Secure Access ControlD  Cisco Network Admission Control

考题 多选题What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.

考题 多选题What are three key differences between the Cisco and Cisco Small Business product portfolios?()Aservice and support optionsBappeal to expanding businessesCease of useDdevice management optionsEramp-up time for technology integration

考题 单选题Cisco Small Business products address which installation requirement more effectively than standard Cisco products?()A wireless technology integrationB use of advanced reporting functionsC VPN technology integrationD minimal technical complexity

考题 单选题What Cisco Switch feature best protects against CAM table overflow attacks?()A  Storm ControlB  Port securityC  CAM table size definitionD  IP spoof preventionE  Network Based Application Recognition

考题 单选题You are Cisco Channel Partner Account Manager. Which service component within the preparephase recommends the appropriate technology strategy to address a business requirement of the customer?()A  finding out what a customer requires from a proposed solutionB  analyzes the customer’s business requirements and recommends the appropriate Cisco technologies to meet business requirementsC  finding out what end-user training a customer requiresD  finding out a customer’s physical requirements