An administrator wants to be alerted when a network-based attack is underway, but the company policy prohibits blocking or dropping network connections. Which of the following MUST be deployed?()
A.IDS B.IPS C.Firewall D.Managed PKI
单项选择题Which of the following components is typically used for voice transmissions and has a 10Mbpsmaximum transfer speed?()
A. 110 block B. Patch panel C. Vertical cross connect D. 66 block
单项选择题Which of the following commands would be used to display the IP address on a UNIX Linux computer?()
A.netstat B.ipconfig C.ifconfig D.dig
单项选择题Which of the following configuration management documentation types would an administrator useto know how and when to property install new network devices on the LAN?()
A. Baseline configuration B. Logical network diagram C. Network policy D. Wiring schematic
单项选择题Which of the following applications is MOST likely to require QoS to ensure proper functionality?()
A. HTTP B. VoIP C. SNMPv3 D. Peer to peer
单项选择题A technician is troubleshooting a network connectivity issue. Given the following abbreviated trace route output: Which of the following is MOST likely occurring?()
A. Switching loop B. Broadcast storm C. IP conflict D. Routing loop