In which areas do SMBs tend to require better products than found in retail stores?()A、voice, intranet, and securityB、wireless, intranet, and wide-area networkingC、wireless, security, and voiceD、security, voice, and wide-area networking

In which areas do SMBs tend to require better products than found in retail stores?()

  • A、voice, intranet, and security
  • B、wireless, intranet, and wide-area networking
  • C、wireless, security, and voice
  • D、security, voice, and wide-area networking

相关考题:

Which of the following offers the HIGHEST wireless security?() A. WEPB. WPA2C. WPAD. HTTPS

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。 A.It specifies use of a static encryption key that must be changed frequently to enhance securityB.It requires use of an open authentication methodC.It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD.It requires that all access points and wireless devices use the same encryption keyE.It includes authentication by PSK

Which of the following is NOT true of security attacks?[A] Employees will keep up with security polices and awareness if they are highly-trained.[B] The rate of security attacks appears faster than the growth of the Internet.[C] One's computer system will never be secure.[D] Vulnerabilities can go through phones, wireless devices, and network appliances

Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

Which three are features of the integrated services routers?()A、Fixed ConfigurationB、Voice MailC、Anti-XD、IPSE、Wireless LANF、VPN Acceleration

What best describes the features of the Cisco 850 Series routers?() A、integrates data,security,and wirelessB、integrates data,ecurity,wireless and application optimizationC、integrates voice,data,security,wireless and application optimizationD、integrates data and wireless

The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()A、 ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.B、 ISRs provide the framework to integrate and extend wired and wireless networksC、 ISRs provide concurrent security, voice, data, wireless, and application optimization services.D、 ISRS provide the common fabric, functionality, and CLI across the network.

If there is an existing 802.11g WLAN at a site, which service can be provided without conducting anew site survey?()A、Add a new 802.11a WLANB、Increase the Layer 2 and Layer 3 security of the WLANC、Increase the throughput for the wireless clientsD、Add new services (such as voice) over the WLAN

You are designing the wireless networks for the three warehouses. Your design must support the inventory and shipping management solution, and it must meet security requirements. What should you do?()A、Ensure that all wireless networking equipment fully supports the IEE 802.11a, IEEE 802.11b, and IEEE 802.11g wireless networking protocolsB、Assign a random service set identifier (SSID) to each wireless access point. Disable broadcasting of SSIDs on all wireless access pointsC、Create a firewall to block traffic to any IP address that did not originate from the company’s DHCP servers. Ensure that all wireless access points connect behind this new firewallD、Configure a server to use Internet Authentication Service (IAS). Configure the wireless networking equipment to use the IEEE 802.1x protocol and the IAS server

Which of the following should be configured on a wireless router to enhance security? (Select TWO).()A、Disable DHCPB、Change wireless channelC、Disable SSID broadcastingD、Change the default username and passwordE、Use a static IP address

Which two statements best describe the wireless security standard that is defined by WPA (Choose two.)()。A、It specifies use of a static encryption key that must be changed frequently to enhance securityB、It requires use of an open authentication methodC、It specifies the use of dynamic encryption keys that change each time a client establishes a connectionD、It requires that all access points and wireless devices use the same encryption keyE、It includes authentication by PSK

What will cause wireless voice devices to perform poorly?()A、average signal strength that is greater than -67 dBiB、cell overlap of 15 to 20 percentC、uneven wireless coverageD、absence of coverage holes

Which two statements best describe the Cisco Unified Wireless Network?()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wirelessnetworks to deliver the best security for companies that are deploying WLANs.B、 The Cisco Unified wireless Network provides the framework to integrate and extend wired andwireless networks to deliver the lowest-possible total cost or ownership for companies that aredeploying WLANsC、 The Cisco Unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security for WLANs that organizations havecome to expect from their VPNs.D、 The Cisco unified Wireless Network extends "wireless awareness" into important elements ofthe network infrastructure, providing the same level of security scalability, reliability ease ofdeployment and management for WLANs that organizations have come to expect from their wiredLANs.

Which two statement best describes the Cisco Unified Wireless Network? ()A、 The Cisco Unified Wireless Network provides the framework to segregate wired and wireless networks to deliver the best security for companies that are deploying WLANsB、 The Cisco Unified Wireless Network provides the framework to integrate and extend wired and wireless networks to deliver the lowest-possible total cost of ownership for companies that are deploying WLANsC、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security for WLANs that organizations have come to expect from their VPNsD、 The Cisco Unified Wireless Network extends wireless awareness into important elements of the network infrastructure, providing the same level of security, sociability, reliability, ease of deployment, and management for WLANs that organizations have come to expect from their wired LANs

Which two series of routers can integrate security services, enable wireless networking, and simplify network management? ()A、 Cisco 830 Series routersB、 Cisco 850 Series routersC、 Cisco 1700 Series Modular Access RoutersD、 Cisco 3800 Series Integrated Services Routers

Identity authentication, protocol encryption, secure guest access, voice over WLAN features, and a small device footprint are all highlights of what product in the wireless technology market?()A、wireless monitoring deviceB、wireless LAN controllerC、wireless bridgeD、wireless management deviceE、access point

Which of the following offers the HIGHEST wireless security?()A、WEPB、WPA2C、WPAD、HTTPS

Which of the following does not affect security on a wireless access point?()A、EncryptionB、DHCPC、PasswordD、SSID

A company needs strong wireless security enabled for minimal cost. Which of the following security measures is the BEST to use?()A、WEPB、Port filteringC、WPAD、Longer SSID broadcast intervals

You need to design a Security strategy for the wireless network at all resort locations.What should you do?()A、Connect the wireless access points to a dedicated subnet. Allow the subnet direct access to the Internet,but not to the company network.Require company users to establish a VPN to access company resourcesB、Install Internet Authentication Service (IAS) on a domain controller.Configure the wireless access points to require IEEE 802.1x authenticationC、Establish IPSec policies on all company servers to request encryption from all computers that connect from the wireless IP networksD、Configure all wireless access points to require the Wired Equivalent Privacy (WEP) protocol for all connections. Use a Group Policy object (GPO) to distribute the WEP keys to all computers in the domain

Your  company,  A.  Datum  Corporation,  has  a  single  Active  Directory  domain  named  intranet.adatum.com. The domain has two domain controllers that run Windows Server 2008 R2  operating system. The domain controllers also run DNS servers.  The intranet.adatum.com DNS zone is configured as an Active Directoryintegrated zone with the  Dynamic updates setting configured to Secure only.  A new corporate security policy requires that the intranet.adatum.com DNS zone must be updated only by  domain controllers or member servers.  You need to configure the intranet.adatum.com zone to meet the new security policy requirement.  Which two actions should you perform()A、Remove the Authenticated Users account from the Security tab of the intranet.adatum.com DNS zone  properties.B、Assign the SELF Account Deny on Write permission on the Security tab of the intranet.adatum.com  DNS zone properties.C、Assign the server computer accounts the Allow on Write All Properties permission on the Security tab  of the intranet.adatum.com DNS zone properties.D、Assign the server computer accounts the Allow on Create All Child Objects permission on the Security  tab of the intranet.adatum.com DNS zone properties.

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A  Physically the voice network and the data network are separate.B  The voice traffic will normally be on a different IP subnet than will the data traffic.C  End user intervention is necessary to place the phone into the proper VLAN.D  The same security policy should be implemented for both voice and data traffic.E  The data VLAN must be configured as the native VLAN.

单选题In which areas do SMBs tend to require better products than found in retail stores?()Avoice, intranet, and securityBwireless, intranet, and wide-area networkingCwireless, security, and voiceDsecurity, voice, and wide-area networking

多选题Which of the following should be configured on a wireless router to enhance security? (Select TWO).()ADisable DHCPBChange wireless channelCDisable SSID broadcastingDChange the default username and passwordEUse a static IP address

单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A Physically the voice network and the data network are separateB The voice traffic will normally be on a different IP subnet than will the data trafficC End user intervention is necessary to place the phone into the proper VLAND The same security policy should be implemented for both voice and data trafficE The data VLAN must be configured as the native VLAN

单选题The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()A ISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.B ISRs provide the framework to integrate and extend wired and wireless networksC ISRs provide concurrent security, voice, data, wireless, and application optimization services.D ISRS provide the common fabric, functionality, and CLI across the network.

单选题You have a wireless access point that is configured to use Advanced Encryption Standard (AES) security. Apre-shared key is not configured on the wireless access point. You need to connect a computer that runsWindows 7 to the wireless access point.  Which security setting should you select for the wirelessconnection?()A802.1xBWPA-PersonalCWPA2-EnterpriseDWPA2-Personal