单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A Spanning tree protectB Root Guard and BPDU GuardC Unicast Reverse Path ForwardingD MAC spoof guardE Port Security
单选题
What Cisco technology protects against Spanning-Tree Protocol manipulation?()
A
Spanning tree protect
B
Root Guard and BPDU Guard
C
Unicast Reverse Path Forwarding
D
MAC spoof guard
E
Port Security
参考解析
解析:
暂无解析
相关考题:
A computer’s case fan protects against which of the following environmental concerns?() A. PressureB. HeatC. Brown outD. Cold
As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology.What is most probably the reason for that?()A. Content pre-positioningB. Automatic discovery of Cisco WAEsC. Comprehensive logs, reports, and graphsD. Remote scheduling of software distribution
Chafing gear ______.A.reduces and prevents corrosion of standing riggingB.prevents corrosion of running riggingC.reduces and prevents wear caused by the rubbing of one object against anotherD.protects the body against extreme cold
What can you install on IPCC Express to protect against worms, zero-day viruses, and other immediate security threats?()A、Microsoft Management Console B、Cisco Security Agent (headless agent) C、Cisco Security Agent Management Center D、Microsoft SQL Server 2000
What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()A、To protect the network in case someone inadvertently creates a physical loop in itB、To ensure that if a device fails another device automatically take over for itC、To allow management of all network devicesD、To aggregate logical network groups together at one central point
Which statement is true about the Cisco Self-Defending Network?()A、The Cisco Self-Defending Network defines the physical position of the firewall to protect against internal and external attacksB、The Cisco Self-Defending Network Provides static filtering against known and unknown internal and external attacksC、The Cisco Self-defending Network Provides dynamic protection against known and unknown internal and external attacksD、The Cisco Self-defending Network Provides the Elements to install the antivirus software on the End-User Workstation
You are Cisco Channel Partner Account Manager. Which service component within the preparephase recommends the appropriate technology strategy to address a business requirement of the customer?()A、 finding out what a customer requires from a proposed solutionB、 analyzes the customer’s business requirements and recommends the appropriate Cisco technologies to meet business requirementsC、 finding out what end-user training a customer requiresD、 finding out a customer’s physical requirements
Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention?()A、Loop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannot.B、UDLD protects against STP failures caused by cabling problems that create one-way links.C、Loop guard detects and protects against duplicate packets being received and transmitted on different ports.D、UDLD protects against unidirectional cabling problems on copper and fiber media.E、Loop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
What is the purpose of Dual Ring Interconnect with D C for SDH rings?()A、Protects signals when a ring switch failsB、Protects signals when multiple span switches failC、Protects pre-emptible traffic from being dropped when a ring switch occursD、Protects signals against any combination of link failure in each ring
What are two benefits of control plane policing?()A、protection against denial of service (DoS) attacks at infrastructure routers and switchesB、 protection against known worm attacks in routers and switchesC、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesD、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesE、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
What Cisco technology protects against Spanning-Tree Protocol manipulation?()A、 Spanning tree protectB、 Root Guard and BPDU GuardC、 Unicast Reverse Path ForwardingD、 MAC spoof guardE、 Port Security
Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A、 Cisco Trust AgentB、 Cisco Self-Defending NetworkC、 Cisco Secure Access ControlD、 Cisco Network Admission Control
What are the three specific characteristics of the Cisco SAN solution for the data center? ()(Choosethree.)A、It provides multiprotocol support.B、It provides improved availability, strong security, and business continuance measures.C、It enables you to connect Cisco VSAN technology and DAS technology.D、It reduces cost and complexity by providing an easy transition to evolving technologies.E、It allows you to create separate networks on the VSAN.F、It allows you to migrate to new technologies without a complete equipment upgrade.
What Cisco Switch feature best protects against CAM table overflow attacks?()A、 Storm ControlB、 Port securityC、 CAM table size definitionD、 IP spoof preventionE、 Network Based Application Recognition
What are two characteristics of dual-ring interconnect in SDH networks? ()A、 It protects signals against node failures between rings.B、 It protects signals against node failure within a single ring.C、 It allows for traffic to be preempted when a ring switch occurs.D、 Traffic can be dropped and continued at interconnecting nodes.E、 It protects preemptible traffic from being dropped when a ring switch occurs.
What are three key differences between the Cisco and Cisco Small Business product portfolios?()A、service and support optionsB、appeal to expanding businessesC、ease of useD、device management optionsE、ramp-up time for technology integration
单选题As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology. What is most probably the reason for that?()AContent pre-positioningBAutomatic discovery of Cisco WAEsCComprehensive logs, reports, and graphsDRemote scheduling of software distribution
单选题A motor enclosure which protects against falling liquids is classified as ()AwaterproofBdrip proofCspray tightDspray proof
多选题Loop guard and UniDirectional Link Detection both protect against Layer 2 STP loops. In which two ways does loop guard differ from UDLD in loop detection and prevention? ()ALoop guard can be used with root guard simultaneously on the same port on the same VLAN while UDLD cannotBUDLD protects against STP failures caused by cabling problems that create one-way links.CLoop guard detects and protects against duplicate packets being received and transmitted on different portsDUDLD protects against unidirectional cabling problems on copper and fiber media.ELoop guard protects against STP failures caused by problems that result in the loss of BPDUs from a designated switch port.
多选题What are two benefits of control plane policing?()Aprotection against denial of service (DoS) attacks at infrastructure routers and switchesBprotection against known worm attacks in routers and switchesCquality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesDquality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesEquality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
单选题Because of the systems-level approach, Cisco security can defend against widespread attacks from hackers and viruses. What describes the Cisco network security strategy?()A Cisco Trust AgentB Cisco Self-Defending NetworkC Cisco Secure Access ControlD Cisco Network Admission Control
多选题What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.
多选题What are three key differences between the Cisco and Cisco Small Business product portfolios?()Aservice and support optionsBappeal to expanding businessesCease of useDdevice management optionsEramp-up time for technology integration
单选题Cisco Small Business products address which installation requirement more effectively than standard Cisco products?()Awireless technology integrationBuse of advanced reporting functionsCVPN technology integrationDminimal technical complexity
单选题What Cisco Switch feature best protects against CAM table overflow attacks?()A Storm ControlB Port securityC CAM table size definitionD IP spoof preventionE Network Based Application Recognition
单选题You are Cisco Channel Partner Account Manager. Which service component within the preparephase recommends the appropriate technology strategy to address a business requirement of the customer?()A finding out what a customer requires from a proposed solutionB analyzes the customer’s business requirements and recommends the appropriate Cisco technologies to meet business requirementsC finding out what end-user training a customer requiresD finding out a customer’s physical requirements
单选题What Cisco technology protects against Spanning-Tree Protocol manipulation?()A Spanning tree protectB Root Guard and BPDU GuardC Unicast Reverse Path ForwardingD MAC spoof guardE Port Security