A.access point B.client adapter C.bridge D.router
单项选择题Which software-based security threat is typically spread from user to user via e-mail?()
A.Data interception B.Virus C.Trojan horse D.Denial of service
单项选择题What does a router do?()
A.Routes traffic down alternative paths and connects the local-area network (LAN) to the wide- area network (WAN) B.Reads Media Access Control (MAC) addresses to forward messages to the correct location and connects the local-area network (LAN) to the wide-area network (WAN) C.Stores data on the network and connects the local-area network (LAN) to the wide-area network (WAN) D.Broadcasts data to all devices that are connected to it across the local-area network (LAN) and wide-area network (WAN)
单项选择题The cisco telepresence portfolio provides industry-leading video-conferencing solutions , how does the Cisco acquisition of tandberg strengthen its position()
A.it enablescisco to eliminate product redundancies and improve margins B.it will givecisco products A strategic advantage by providing privileged access to the TIP C.it providescisco with its first high-end telepresence offering D.it allowscisco to quickly broaden its product portfolio to better serve customer needs
单项选择题Why is the Cisco Integrated Services Router product line A good choice for customers?()
A.it is A point product solution that addresses A single need B.it simplifies purchasing because there is only one model to choose. C.it integrates multiple services into A single platform and reduces operating costs. D.it provides customers with an opportunity to increase the number of devices in their network
多项选择题In which two ways do TANDBERG and Cisco TelePresence solutions interoperate? ()
A.gated B.integrated C.bridged D.converted E.spanned