A.Frame-Relay B.Leased Line C.MPLS D.DSL E.Cable F.Wireless
单项选择题Toprotectthenetworkfromexternalandinternalthreats,whereshouldCiscoIPSbeenabledonanISR?()
A.Globally on the ISR B.On the Console and Auxiliary Ports of the ISR C.On the untrusted (Outside) interface of the ISR D.On the trusted (Inside) interface of the ISR E.On the WAN and LAN interfaces of the ISR
多项选择题Whichthreeofthesepre-requisiteforresettingaCatalystExpress500switchwhenCiscoNetworkAssistantisunavailable?()
A.At Least one enabled switch port that is unconnected to any device B.A PC pre-configured with a specific IP Address and Mask C.A PC or laptop with Windows 2000 or Windows XP installed and a web browser that has Java Script enabled D.Physical Access to Switch E.A Switch with no connected devices
单项选择题Whenusingthestepstosuccessmethodology,wheredoesQuoteBuilderfitintothedealprocessflow?()
A.It encompasses the validate and solve steps B.It encompasses the Discovery, Validate and Solve steps C.It encompasses the Discover, Validate, Solve and Present Steps D.It encompasses the Discovery, Solve and Close steps E.It encompasses the Discovery, Validate and Present Steps
问答题You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested network security mechanisms. You are required to match the correct mechanism with the proper description.
多项选择题Whendeterminingacustomer’ssecurityrequirementsusingthesecuritysitesurveyfromthestepsforsuccessmethodology,whichthreeofthesesshouldbeincludedinthecustomer’ssecuritypolicyandprocedures?()
A.Third-party due diligence policy review B.Remote Access Policy C.Encryption Policy D.Application change control policy E.Security Personnel policy