niusouti.com

Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()A、port-based RADIUSB、802.1q trunkin

题目

Two access points running the core feature set are connected to the same switch and are providingguest services. If PSPF is enabled, what must be enabled on the switch to prevent clients fromseeing one another’s data?()

  • A、port-based RADIUS
  • B、802.1q trunking
  • C、inline power
  • D、protected port

相似考题
更多“Two access points&ens”相关问题
  • 第1题:

    A user typically connects to the Internet in one of two ways: dedicated access and()access.

    • A、 broadcasting
    • B、 point-to-point
    • C、 dial-up
    • D、 Internet

    正确答案:C

  • 第2题:

    What are two recommended ways of protecting network device configuration files from outside network security threats? (Choose two.)()

    • A、Allow unrestricted access to the console or VTY ports.
    • B、Use a firewall to restrict access from the outside to the network devices.
    • C、Always use Telnet to access the device command line because its data is automatically encrypted.
    • D、Use SSH or another encrypted and authenticated transport to access device configurations.
    • E、Prevent the loss of passwords by disabling password encryption. 

    正确答案:B,D

  • 第3题:

    What are two reasons that a network administrator would use access lists? (Choose two.) ()。

    • A、to control vty access into a router  
    • B、to control broadcast traffic through a router  
    • C、to filter traffic as it passes through a router  
    • D、to filter traffic that originates from the router  
    • E、to replace passwords as a line of defense against security incursions 

    正确答案:A,C

  • 第4题:

    Your network contains two Active Directory sites. The sites connect to each other by using a WAN link.  You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite.  Each site will contain a Client Access array.  You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements: .Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange servers What are two possible ways to achieve this goal?()

    • A、Add the Hub Transport server role to each Mailbox server.
    • B、Add the Hub Transport server role to each Client Access server.
    • C、Deploy two Hub Transport servers on two new servers in each site.
    • D、Deploy one Hub Transport server on a new server, and then install the SMTP service on each ClientAccess server.

    正确答案:A,B

  • 第5题:

    You have a Microsoft Internet Security and Accelerator (ISA) 2006 server that provides all Internet accessfor your company.  You have two Mailbox servers configured in a database availability group (DAG), two Client Accessservers, and two Hub Transport servers.  You need to recommend changes to the environment to ensure that users can access Outlook Web App(OWA) from the Internet if any single server fails.  What should you recommend?()

    • A、Configure a Client Access server array.
    • B、Deploy a second ISA server and create an ISA server array.
    • C、Implement Windows Network Load Balancing for the Client Access servers.
    • D、Deploy two Edge Transport servers that are configured to use EdgeSync synchronization.

    正确答案:B

  • 第6题:

    多选题
    Which two secure remote access methods are available on the WX platforms?() (Choose two.)
    A

    SSL

    B

    SSH

    C

    Telnet

    D

    HTTP


    正确答案: C,D
    解析: 暂无解析

  • 第7题:

    多选题
    What are two recommended ways of protecting network device configuration files from outside network security threats (Choose two.)()。
    A

    Allow unrestricted access to the console or VTY ports

    B

    Use a firewall to restrict access from the outside to the network devices

    C

    Always use Telnet to access the device command line because its data is automatically encrypted

    D

    Use SSH or another encrypted and authenticated transport to access device configurations

    E

    Prevent the loss of passwords by disabling password encryption


    正确答案: E,D
    解析: 暂无解析

  • 第8题:

    多选题
    Which the two demonstrate encapsulation of data?()
    A

    Member data have no access modifiers.

    B

    Member data can be modified directly.

    C

    The access modifier for methods is protected.

    D

    The access modifier to member data is private.

    E

    Methods provide for access and modification of data.


    正确答案: E,C
    解析: 暂无解析

  • 第9题:

    多选题
    What are two benefits of the Cisco TAC?()
    A

    Having Access to the current software releases and support for software packages

    B

    Having direct or indirect access to the Cisco TAC global organization

    C

    Having improved network availability and performance

    D

    HavingThe ability to access a group of experts


    正确答案: C,B
    解析: 暂无解析

  • 第10题:

    Which two demonstrate encapsulation of data? ()

    • A、 Member data have no access modifiers.
    • B、 Member data can be modified directly.
    • C、 The access modifier for methods is protected.
    • D、 The access modifier to member data is private.
    • E、 Methods provide for access and modification of data.

    正确答案:D,E

  • 第11题:

    Which two types of activities does the Lightweight Access Point Protocol (LWAPP) define? (Choose two.)()

    • A、 access point certification and software control
    • B、 compression and Layer 3 address mapping
    • C、 Layer 3 addressing and distribution
    • D、 packet encapsulation, fragmentation, and formatting
    • E、 SNMP monitoring services

    正确答案:A,D

  • 第12题:

    How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()

    • A、By adding two separate connections in the connections dialog box
    • B、By adding two separate intranet Controllers under the configuration hierarchy
    • C、By adding one intranet Controller and one SA under the configuration hierarchy
    • D、By adding two URLs under a connection in the connections dialog box

    正确答案:A

  • 第13题:

    Your network consists of a single Active Directory site. You plan to deploy Exchange Server 2010.  You need to plan the deployment of Exchange Server 2010 servers to meet the following requirements:.All Mailbox servers must belong to a database availability group (DAG) .MAPI connections from Outlook clients must be load balanced by using a hardware load balancer .If a single server fails, users must continue to send and receive e-mail .The plan must minimize the number of servers deployed  What should you include in the plan?()

    • A、Deploy two servers. On the two servers,deploy the Mailbox server role,the Client Access server role,and the HubTransport server role. Configure a Client Access server array.
    • B、Deploy two servers. On the two servers, deploy the Mailbox server role,the Client Access Server role,and the HubTransport server role. Enable Outlook Anywhere on both Client Access servers.
    • C、Deploy four servers. On two of the servers,deploy the Mailbox server role and the Hub Transport server role. On the other two servers,deploy the Client Access server role. Configure a Client Access server array.
    • D、Deploy four servers. On two of the servers,deploy the Mailbox server role. On the other two servers,deploy the Client Access server role and the Hub Transport server role. Enable Outlook Anywhere on both Client Access servers.

    正确答案:A

  • 第14题:

    Your network contains two Active Directory sites. The sites connect to each other by using a WAN link.  You plan to deploy two Exchange Server 2010 Mailbox servers and two Client Access servers in eachsite.  Each site will contain a Client Access array.  You need to recommend a solution to deploy Hub Transport servers. The solution must meet the following requirements:.Continue to deliver e-mail messages to users in other sites if a single Hub Transport server fails .Support the planned Client Access array deployment.Minimize the number of Exchange servers What are two possible ways to achieve this goal?()

    • A、Add the Hub Transport server role to each Mailbox server.
    • B、Add the Hub Transport server role to each Client Access server.
    • C、Deploy two Hub Transport servers on two new servers in each site.
    • D、Deploy one Hub Transport server on a new server, and then install the SMTP service on each Client Access server.

    正确答案:A,B

  • 第15题:

    多选题
    Which two components are unique to controller-based wireless installations? ()
    A

    Mobility Services Engine

    B

    WLAN controller

    C

    Cisco Wireless Control System

    D

    rugged/exterior access points

    E

    interior access points


    正确答案: C,D
    解析: 暂无解析

  • 第16题:

    单选题
    How would an end user add both a Junos Pulse Access Control Service URL and a Junos Pulse Secure Access Service URL to the same Junos Pulse client?()
    A

    By adding two separate connections in the connections dialog box

    B

    By adding two separate intranet Controllers under the configuration hierarchy

    C

    By adding one intranet Controller and one SA under the configuration hierarchy

    D

    By adding two URLs under a connection in the connections dialog box


    正确答案: D
    解析: 暂无解析

  • 第17题:

    多选题
    Which two practices help secure the configuration utilities on wireless access points from unauthorized access? (Choose two.)()
    A

    assigning a private IP address to the AP

    B

    changing the default SSID value

    C

    configuring a new administrator password

    D

    changing the mixed mode setting to single mode

    E

    configuring traffic filtering


    正确答案: E,B
    解析: 暂无解析

  • 第18题:

    多选题
    What are two indicators that a customer should consider the installation of a Wireless LAN Controller? ()
    A

    need one access point

    B

    want to provide unsecured wireless access

    C

    need between two and three access points

    D

    want to provide employee wireless access

    E

    need more than four access points

    F

    want to provide guest wireless access


    正确答案: F,D
    解析: 暂无解析