单项选择题Which statement about CiscoWorks 2000 Inventory Manager is true?()

A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.


您可能感兴趣的试卷

你可能感兴趣的试题

1.多项选择题

Which two characteristics are true of a firewall running in routed mode based on the following information?()

A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.

2.多项选择题Which three things can be restricted by the Class of Service in a traditional PBX?()

A. dial plans
B. dialed numbers
C. voice mail prompts
D. phone features

3.单项选择题Distribution layer: This layer includes LAN-based routers and layer 3 switches . When is a first-hop redundancy protocol needed in the distribution layer?()

A. OSPF is not supported by the design
B. HSRP is not supported by the design
C. preempt tuning of the default gateway is needed
D. the design implements Layer 3 between the access switch and the distribution switch

4.单项选择题When dealing with transparent caching, where should the Content Engines be placed?()

A. close to the servers
B. close to the end users
C. at the Internet edge
D. in front of web server farms

5.单项选择题The VPN termination function provides the ability to connect two networks together securely over the internet. Which of these is true of IP addressing with regard to VPN termination?()

A. termination devices need routable addresses inside the VPN
B. termination devices need not routable addresses inside the VPN
C. IGP routing protocols will update their routing tables over anIPsec VPN
D. addressing designs need to allow for summarization

7.多项选择题You are the Cisco Network Designer in Cisco.com. Which of these are important when determining how many users a NAS can support?()

A. bandwidth
B. number of plug-ins per scan
C. total number of network devices
D. number of checks in each posture assessment

8.单项选择题Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()

A. dynamic reconfiguration
B. path MTU discovery
C. auto setup
D. remote management

9.多项选择题Which two characteristics are most typical of a SAN? ()

A. NICs are used for network connectivity.
B. Servers request specific blocks of data.
C. Storage devices are directly connected to servers.
D. A fabric is used as the hardware for connecting servers to storage devices.
E. The TCO is higher because of the cost of director class storage switches.

10.单项选择题What is high availability?()

A. redundant infrastructure
B. clustering of computer systems
C. reduced MTBF
D. continuous operation of computing systems

最新试题

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

题型:单项选择题

In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()

题型:单项选择题

What is the recommended radius of a cell for a voice-ready wireless network?()

题型:单项选择题

Which three of these are important when determining NAS Server scaling? ()

题型:多项选择题

During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()

题型:单项选择题

Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

题型:单项选择题

Which of the following is the primary consideration to scale VPNs?()

题型:单项选择题

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

题型:单项选择题

How many channels are defined in the IEEE 802.11b DSSS channel set?()

题型:单项选择题

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

题型:单项选择题