63
64
254
255
第1题:
A.SSH
B.WEP
C.VPN
D.WPA
第2题:
What are three factors a network administrator must consider before implementing Netflow in the network?()
第3题:
Is that your pencil shar.pener?(作否定回答)
No,________ ________
第4题:
An administrator is implementing a wireless network. Which of the following encryption technologies is the MOST secure method and will authenticate devices to the network?()
第5题:
An administrator is implementing a new data retention program for the company. Which of the following is the MOST important consideration as the new program is created? ()
第6题:
A.CPU utilization
B.where Netflow data will be sent
C.number of devices exporting Netflow data
D.port availability
E.SNMP version
F.WAN encapsulation
第7题:
A cluster administrator decides ti implement application monitoring in order to monitor both a web application and its supporting database. The plan is to use a single resource group prod_rg and to configure one monitor method for the web app and one monitor method for the database. Which of the following statements best describes the need for custom resource monitor?()
第8题:
A. Caching engines
B. QoS
C. Traffic shaping
D. Load balancing
第9题:
An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()
第10题:
Multiple users call from the same location saying that they have no network connectivity. The administrator is unable to ping the main switch at that IDF. Which of the following configuration management documents would the administrator MOST likely consult to troubleshoot the issue?()