A. BGP
B. IGRP
C. ISIS
D. OSPF
E. EIGRP
您可能感興趣的試卷
你可能感興趣的試題
A. routers
B. LAN switches
C. PBX switches
D. TDM switches
E. appliances
A. a methodology for proactively updating equipment before it reaches the end of its life
B. a methodology for introducing new technologies
C. a methodology for creating a business plan
D. a methodology for determining total cost or ownership
A. Cisco Aironet 1000 Series
B. Cisco Aironet 1100 Series
C. Cisco Aironet 1200 Series
D. Cisco Aironet 1300 Series
E. Cisco Aironet 1400 Series
A. Preparation
B. Planning
C. Design
D. Implementation
E. Operation
F. Optimization
A. Cisco ISR Routers with the Enhanced Security Bundles support WebVPN.
B. Cisco security appliances act as a proxy between the end user and the target web server.
C. Cisco PIX Security Appliances (running release 7.0) and Adaptive Security Appliances both support WebVPN.
D. Cisco’s WebVPN solution supports both TCP and UDP port forwarding for legacy application support.
最新試題
At which stage of the Cisco Lifecycle Services approach should customer education presentations occur? ()
Which two of these statements best describe the benefits of WPAv2? (Choose two.)()
Which item is a feature of Cisco Compatible Extensions, Version 3? ()
Which network management solution performs configuration, monitoring, and management of Cisco Firewall, VPN router, and IPS devices as well as maintains network device inventory and software distribution features?()
In CiscoWorks LAN Management Solution, what are some of the examples of a managed device (sometimes called network elements)? (Choose three.) ()
After properly configuring multiple VLANs, an administrator has decided to secure its VLAN network. Which three steps are required to secure this environment? (Choose three.)()
Which two of these are correct regarding access control lists? (Choose two.) ()
Which two of these data encryption AIM modes are found on the 3800 family of Cisco ISR Routers? (Choose two.)()
Which Cisco PIX and ASA feature provides reliable, comprehensive security against virus and worm propagation, as well as data theft? ()
A Cisco Catalyst switch can belong to how many VTP domains? ()