Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()A、port-based RADIUSB、802.1q trunkingC、inline powerD、protected port

Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()

  • A、port-based RADIUS
  • B、802.1q trunking
  • C、inline power
  • D、protected port

相关考题:

What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。 A.Allow unrestricted access to the console or VTY portsB.Use a firewall to restrict access from the outside to the network devicesC.Always use Telnet to access the device command line because its data is automatically encryptedD.Use SSH or another encrypted and authenticated transport to access device configurationsE.Prevent the loss of passwords by disabling password encryption

Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()A、assigning a private IP address to the APB、changing the default SSID valueC、configuring a new administrator passwordD、changing the mixed mode setting to single modeE、configuring traffic filtering

What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()A、need one access pointB、want to provide unsecured wireless accessC、need between two and three access pointsD、want to provide employee wireless accessE、need more than four access pointsF、want to provide guest wireless access

Which two components are unique to controller-based wireless installations? ()A、 Mobility Services EngineB、 WLAN controllerC、 Cisco Wireless Control SystemD、 rugged/exterior access pointsE、 interior access points

A user typically connects to the Internet in one of two ways: dedicated access and()access.A、 broadcastingB、 point-to-pointC、 dial-upD、 Internet

Which two demonstrate encapsulation of data? ()A、 Member data have no access modifiers.B、 Member data can be modified directly.C、 The access modifier for methods is protected.D、 The access modifier to member data is private.E、 Methods provide for access and modification of data.

What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()A、Allow unrestricted access to the console or VTY ports.B、Use a firewall to restrict access from the outside to the network devices.C、Always use Telnet to access the device command line because its data is automatically encrypted.D、Use SSH or another encrypted and authenticated transport to access device configurations.E、Prevent the loss of passwords by disabling password encryption.

Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()A、 access point certification and software controlB、 compression and Layer 3 address mappingC、 Layer 3 addressing and distributionD、 packet encapsulation, fragmentation, and formattingE、 SNMP monitoring services

What are two reasons that a network administrator would use access lists? (Choose two.) ()。A、to control vty access into a router  B、to control broadcast traffic through a router  C、to filter traffic as it passes through a router  D、to filter traffic that originates from the router  E、to replace passwords as a line of defense against security incursions

How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()A、By adding two separate connections in the connections dialog boxB、By adding two separate intranet Controllers under the configuration hierarchyC、By adding one intranet Controller and one SA under the configuration hierarchyD、By adding two URLs under a connection in the connections dialog box

Your network contains two Active Directory sites. The sites connect to each other by using a WAN link.  You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite.  Each site will contain a Client Access array.  You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements: .Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange servers What are two possible ways to achieve this goal?()A、Add the Hub Transport server role to each Mailbox server.B、Add the Hub Transport server role to each Client Access server.C、Deploy two Hub Transport servers on two new servers in each site.D、Deploy one Hub Transport server on a new server, and then install the SMTP service on each ClientAccess server.

Your network consists of a single Active Directory site. You plan to deploy Exchange Server 2010.  You need to plan the deployment of Exchange Server 2010 servers to meet the following requirements:.All Mailbox servers must belong to a database availability group (DAG) .MAPI connections from Outlook clients must be load balanced by using a hardware load balancer .If a single server fails, users must continue to send and receive e-mail .The plan must minimize the number of servers deployed  What should you include in the plan?()A、Deploy two servers. On the two servers,deploy the Mailbox server role,the Client Access server role,and the HubTransport server role. Configure a Client Access server array.B、Deploy two servers. On the two servers, deploy the Mailbox server role,the Client Access Server role,and the HubTransport server role. Enable Outlook Anywhere on both Client Access servers.C、Deploy four servers. On two of the servers,deploy the Mailbox server role and the Hub Transport server role. On the other two servers,deploy the Client Access server role. Configure a Client Access server array.D、Deploy four servers. On two of the servers,deploy the Mailbox server role. On the other two servers,deploy the Client Access server role and the Hub Transport server role. Enable Outlook Anywhere on both Client Access servers.

You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()A、Configure a Client Access server array.B、Deploy a second ISA server and create an ISA server array.C、Implement Windows Network Load Balancing for the Client Access servers.D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

Your network contains two Active Directory sites. The sites connect to each other by using a WAN link.  You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite.  Each site will contain a Client Access array.  You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements:.Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange servers What are two possible ways to achieve this goal?()A、Add the Hub Transport server role to each Mailbox server.B、Add the Hub Transport server role to each Client Access server.C、Deploy two Hub Transport servers on two new servers in each site.D、Deploy one Hub Transport server on a new server, and then install the SMTP service on each Client Access server.

多选题Which two secure remote access methods are available on the WX platforms?() (Choose two.)ASSLBSSHCTelnetDHTTP

多选题Which two components are unique to controller-based wireless installations? ()AMobility Services EngineBWLAN controllerCCisco Wireless Control SystemDrugged/exterior access pointsEinterior access points

多选题What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。AAllow unrestricted access to the console or VTY portsBUse a firewall to restrict access from the outside to the network devicesCAlways use Telnet to access the device command line because its data is automatically encryptedDUse SSH or another encrypted and authenticated transport to access device configurationsEPrevent the loss of passwords by disabling password encryption

单选题How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()ABy adding two separate connections in the connections dialog boxBBy adding two separate intranet Controllers under the configuration hierarchyCBy adding one intranet Controller and one SA under the configuration hierarchyDBy adding two URLs under a connection in the connections dialog box

多选题Which the two demonstrate encapsulation of data?()AMember data have no access modifiers.BMember data can be modified directly.CThe access modifier for methods is protected.DThe access modifier to member data is private.EMethods provide for access and modification of data.

多选题Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()Aassigning a private IP address to the APBchanging the default SSID valueCconfiguring a new administrator passwordDchanging the mixed mode setting to single modeEconfiguring traffic filtering

多选题What are two benefits of the Cisco TAC?()AHaving Access to the current software releases and support for software packagesBHaving direct or indirect access to the Cisco TAC global organizationCHaving improved network availability and performanceDHavingThe ability to access a group of experts

多选题What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()Aneed one access pointBwant to provide unsecured wireless accessCneed between two and three access pointsDwant to provide employee wireless accessEneed more than four access pointsFwant to provide guest wireless access