單項選擇題What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()

A.To protect the network in case someone inadvertently creates a physical loop in it
B.To ensure that if a device fails another device automatically take over for it
C.To allow management of all network devices
D.To aggregate logical network groups together at one central point


您可能感興趣的試卷

你可能感興趣的試題

3.單項選擇題Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()

A.The Cisco Control VLAN carries only Layer 2 control traffic
B.802.1Q trunking is used between the access switch and the router
C.There is no 802.1Q trunking used in these designs
D.When 802.1Q trunks are configured, they are also called Native VLANs
E.Trunking Ensures that traffic from only one VLAN is carried on that trunk

4.單項選擇題Which statements describes the remote sites in a Cisco Single-Site Secure Network Foundation solution with remote teleworkers?()

A.They are separate from the central site and use NAT to route through the Internet to the Central Site
B.They are part of the VLANs at the Central Site; they are in the same subnets
C.They use public IP Addresses that are routable through the Internet
D.They are in separate subnets but are part of the private address space of the network

5.多項選擇題When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()

A.Duplex mode selections
B.Auto MDIX selections
C.Status Selections
D.Group mode selections
E.Port security selections

最新試題

When using Cisco Network Assistant to configure a WS-CE500-24LC switch, which three are available choices in the port settings window?()

題型:多項選擇題

When using the steps to success methodology, where does Quote Builder fit into the deal process flow?()

題型:單項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. In a Cisco Single-Site Secure Network Foundation implementation, which factor affects your choice of switch Configuration?()

題型:單項選擇題

During which phase of the Steps to Success methodology for Cisco SMB Security Solutions would the Security Technology Requirements document be used to determine a customer’s security requirements?()

題型:單項選擇題

During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()

題型:單項選擇題

You work as a network technician at Certkiller .com. Please study the exhibit carefully. From this Cisco SDM security Audit Wizard screen, what should you do to secure the Router?()

題型:單項選擇題

Which two statements about configuration an unconnected Catalyst Express 500 switch from setup mode using a PC are true?()

題型:多項選擇題

You work as a network technician at Certkiller .com. Your boss, Mrs. Certkiller, is interested network security mechanisms. You are required to match the correct mechanism with the proper description.

題型:問答題

Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()

題型:多項選擇題

In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()

題型:多項選擇題