A.19dbm
B.10dbm
C.67dbm
D.86dbm
您可能感兴趣的试卷
你可能感兴趣的试题
A. Use default Layer 4 hash in core.
B. Use default Layer 3 hash in distribution.
C. Use default Layer 4 hash in distribution.
D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
A. inline with a firewall
B. in a DMZ outside the firewall
C. parallel with a firewall
D. in a DMZ behind the firewall
A. bandwidth
B. number of plug-ins per scan
C. total number of network devices
D. number of checks in each posture assessment
Please match the Cisco STP enahancement term to its definition.()
(1) BPDU guard
(2) PortFast
(3) BackboneFast
(4) Loop guard
(5) Root guard
(a) shuts down a port that receives a BPDU when enabled
(b) cuts convergence time by mas-age for indirect failure
(c) prevents the aliernate or root port from being designated in absence of BPDUs
(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state
(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links
A.(a)-(1);(b)-(2);(c)-(4);(d)-(5);(e)-(3)
B.(a)-(4);(b)-(3);(c)-(2);(d)-(5);(e)-(1)
C.(a)-(3);(b)-(2);(c)-(4);(d)-(5);(e)-(1)
D.(a)-(1);(b)-(3);(c)-(4);(d)-(2);(e)-(4)
A. connection speed
B. number of remote sites
C. features to be supported
D. types of devices at the remote site
A.full mesh
B.peer-to-peer
C.partial mesh
D.hub and spoke
Please match the Cisco NAC appliance component to its description.()
(1)Cisco NAS
(2)Cisco NAA
(3)Rule-set Lpdates
(4)Cisco NAM
(a) a centralized management point
(b) an in-band cr out-of-band device for network access control
(c) a Windows-based client which allows network access based on the tasks running
(d) a status crecker for operating systems,antivirus,antispyware,etc.
A.(a)-(4);(b)-(1);(c)-(2);(d)-(3)
B.(a)-(3);(b)-(2);(c)-(4);(d)-(1)
C.(a)-(4);(b)-(3);(c)-(1);(d)-(2)
D.(a)-(2);(b)-(4);(c)-(3);(d)-(1)
Refer to the exhibit. Which two statements about the topologies shown are correct?()
A. Design 1 is a looped triangle design.
B. Design 2 is a looped triangle design.
C. Design 2 achieves quick convergence using RSTP.
D. Both designs supportstateful services at the aggregation layer.
E. Design 2 is the most widely deployed in enterprise data centers.
A.ISL
B.IVR
C.VoQ
D.VSANs
E.Enhanced ISL
A.IVR
B.FSPF
C.FICON
D.SANTap
最新试题
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
Which signal and noise values will result in the best phone communication with an access point?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()