CMS专题

单选题Cisco Clean Access ensures that computers connecting to your network have which of the following?()ANo vulnerable applications or operating systemsBNo viruses or wormsCAppropriate security applications and patch levelsDCurrent IPS signaturesECisco Secu

题目
单选题
Cisco Clean Access ensures that computers connecting to your network have which of the following?()
A

 No vulnerable applications or operating systems

B

 No viruses or worms

C

 Appropriate security applications and patch levels

D

 Current IPS signatures

E

 Cisco Security Agent

如果没有搜索结果,请直接 联系老师 获取答案。
如果没有搜索结果,请直接 联系老师 获取答案。
相似问题和答案

第1题:

You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()

A.5

B.10

C.14

D.20


参考答案:C

第2题:

Cisco Clean Access ensures that computers connecting to your network have which of the following?()

  • A、 No vulnerable applications or operating systems
  • B、 No viruses or worms
  • C、 Appropriate security applications and patch levels
  • D、 Current IPS signatures
  • E、 Cisco Security Agent

正确答案:C

第3题:

Your security policy requires that users authenticating to the Junos Pulse Access Control Service are connecting from a domain member endpoint on the internal corporate network.Which set of role access restrictions must you configure to enforce this security policy?()

A. Source IP and browser

B. Source IP and certificate

C. Certificate and Host Checker

D. Host Checker and source IP


参考答案:D

第4题:

Cisco SMARTnet maintains the operational health of your network through Cisco expertise and resources that promote greater uptime and extend the value of your IT investment. Which serviceis provided by Cisco SMARTnet?()

  • A、 upgrade discounts
  • B、 Free CCO account
  • C、 Cisco Learning Credits
  • D、 around-the-clock access toCisco Technical Access Center

正确答案:D

第5题:

A rogue access point is detected on the Cisco WCS console. Upon investigation, the access point isdiscovered to belong to a neighboring business. Your administrator should designate the rogueaccess point as which of the following?()

  • A、known internal
  • B、managed
  • C、friendly
  • D、known external

正确答案:D

第6题:

You are the Cisco Network Designer in Cisco.com. Your company is using the G.711 codec with 802.11a access point radios. This can support a maximum of how many phones per access point?()

  • A、5
  • B、10
  • C、14
  • D、20

正确答案:C

第7题:

Which of the following of a component of the Cisco SMB Support Assistant?()

  • A、SupportFor Every Technology
  • B、Cisco IOS Bug Fixes
  • C、Access to theSoftware Center
  • D、Full Access to the Cisco.com website

正确答案:B

第8题:

You install a new hardware router that provides wireless network connectivity between your computer and the Internet. You connect to the router by using a wireless network adapter.Your computer is able to access the Internet but is unable to discover other computers in the local wireless network.You need to configure the wireless connection to allow your computer to discover other computers.What should you do?()

A.A

B.B

C.C

D.D


参考答案:A

第9题:

From small businesses to large-scale enterprises, which two best describe how the Cisco UnifiedWireless Network reduces overall operational expenses?()

  • A、 extends networkQoS throughout the network
  • B、 simplifies management of central or remotely locates access points
  • C、 ensures implementation of the most recent security protocols
  • D、 streamlines wireless LAN management
  • E、 extends features for optical traffic network services

正确答案:B,D

第10题:

Of the threats discussed below, what is the main advantage of using Cisco Secure Desktop which is part of the Cisco ASA VPN solution?()

  • A、 Secure desktop will create a completely separate computing environment thatwill be deleted when you are done.This ensures that no confidential data has been left on the shared/public computer.
  • B、 Secure desktop is used to protect access to your registry and systemfiles when browsing to SSL/VPN protectedpages.
  • C、 Secure Desktop ensures that an SSLprotected password cannotbe exploitedby a man in the middle attackusing a spoofed certificate.
  • D、 Secure desktop hardens the operating system of the machines you are using at the time secure desktop islaunched.

正确答案:A

更多相关问题