A. 0.01 B. 0.1 C. 1 D. 2.5
多项选择题Whatarethreeprimaryactivitiesinthecycleofbuildinganenterprisesecuritystrategy?()
A. activity audit B. administration C. policy establishment D. technology implementation
多项选择题Whichtwoofthesearerecommendedpracticeswithtrunks?()
A. use ISL encapsulation B. use 802.1q encapsulation C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation D. use VTP server mode to support dynamic propagation of VLAN information across the network E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
单项选择题Whenisthesite-to-siteremoteaccessmodelappropriate?()
A. for multiple ISDN connections B. for modem concentrated dial-up connections C. for a group of users in the same vicinity sharing a connection D. for use by mobile users
单项选择题Whichroutingprotocolsupportsaflexibleareastructureusingroutinglevelsoneandtwo?()
A. OSPF B. EIGRP C. IS-IS D. BGP
单项选择题Whichsite-to-siteVPNsolutionallowsCiscorouters,PIXFirewalls,andCiscohardwareclientstoactasremoteVPNclientsinordertoreceivepredefinedsecuritypoliciesandconfiguration parametersfromtheVPNheadendatthecentralsite?()
A. Easy VPN B. GRE tunneling C. Virtual Tunnel Interfaces D. Dynamic Multipoint VPN E. Group Encrypted Transport VPN