单选题Which deployed VoWLAN client security option is recommended by Cisco?()A Layer 3 with Layer 3 Security set to None and Web Policy set to AuthenticationB Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-ThroughC Layer 3 with Laye

题目
单选题
Which deployed VoWLAN client security option is recommended by Cisco?()
A

Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication

B

Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through

C

Layer 3 with Layer 3 Security set to VPN Pass-Through

D

Layer 2 with Layer 2 Security set to 802.1X


相似考题
更多“Which deployed VoWLAN client security option is recommended ”相关问题
  • 第1题:

    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)

    • A、A client group is a list of clients associated with a group.
    • B、A client group is a list of groups associated with a client.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第2题:

    Which two firewall user authentication objects can be referenced in a security policy?()

    • A、access profile
    • B、client group
    • C、client
    • D、default profile

    正确答案:B,C

  • 第3题:

    After a client has developed a security policy, what is recommended that they do next?()

    • A、monitor and respond
    • B、analyze and improve
    • C、secure the network
    • D、test the system

    正确答案:A

  • 第4题:

    What is a virtual firewall?()

    • A、another name for a firewall deployed in routed mode
    • B、another name for a firewall deployed in transparent mode
    • C、a separation of multiple firewall security contexts on a single firewall
    • D、a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
    • E、a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)

    正确答案:C

  • 第5题:

    Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()

    • A、 Security Controls
    • B、 Database Access
    • C、 Set Security Profile
    • D、 Authorize Group Reassignment

    正确答案:D

  • 第6题:

    You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader.  Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced.  Which three actions should you perform?() 

    • A、Select the Advanced (custom settings) security option.
    • B、Select the Require data encryption check box. 
    • C、Select the Typical (recommended settings) security option. 
    • D、Select the Use smart card item from the Validate my identity as follows list.
    • E、Select the Maximum strength encryption item from the Data encryption list.
    • F、Select the Extensible Authentication Protocol (EAP) option, and select Smart Card or other Certificate from the EAP list.

    正确答案:A,E,F

  • 第7题:

    单选题
    Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()
    A

     Cisco Integrated Service Routers

    B

     Cisco ASA 5500 Series Security Appliance

    C

     CiscoWebVPN Services Module

    D

     CiscoIPsec VPN Module


    正确答案: B
    解析: 暂无解析

  • 第8题:

    单选题
    Which option provides a hierarchy of data security across lines of business?()
    A

    Alerts

    B

    Multi-Org

    C

    Flexfields

    D

    Shared entities

    E

    Business Intelligence


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You are the network administrator for ExamSheet.net.  You have implemented the Hisecws.inf security template on all the Windows 2000 Professional computers in your network by using a GPO. A user has received a driver and utility software for the internal SCSI controller on his computer. The SCSI controller is not currently on the HCL. He uses the manufacturer provided CD to install the driver and the utility. He restarts the computer and reports that the internal SCSI controller is not working correctly.  You want to allow all users to install this driver on their client computers. You want to accomplish this task with the least amount of administrative effort. What should you do?()
    A

    Modify the GPO to change the Driver Signing option. 

    B

    Run theSigverifcommand on each client computer.

    C

    Reconfigure the Driver Signing option on each client computer. Install the driver on each client     computer. Reapply the security template settings on each client computer.

    D

    Modify the Hisecws.inf security template on each client computer to change the Driver Signing     option.

    E

    Modify the Hisecws.inf security template on the domain controller to change the Driver Signing     option.


    正确答案: A
    解析: 暂无解析

  • 第10题:

    多选题
    Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
    A

    A client group is a list of clients associated with a group.

    B

    A client group is a list of groups associated with a client.

    C

    Client groups are referenced in security policy in the same manner in which individual clients are referenced.

    D

    Client groups are used to simplify configuration by enabling firewall user authentication without security policy.


    正确答案: D,A
    解析: 暂无解析

  • 第11题:

    单选题
    Which deployed VoWLAN client security option is recommended by Cisco?()
    A

    Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication

    B

    Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through

    C

    Layer 3 with Layer 3 Security set to VPN Pass-Through

    D

    Layer 2 with Layer 2 Security set to 802.1X


    正确答案: D
    解析: 暂无解析

  • 第12题:

    多选题
    Which two pieces of information does the Cisco WLC v5.2 client monitor feature provide about a VoWLAN client?()
    A

    RSSI of the client at the access point

    B

    WMM state

    C

    current MOS value

    D

    current RF channel

    E

    current transmit data rate


    正确答案: C,D
    解析: 暂无解析

  • 第13题:

    Which two pieces of information does the Cisco WLC v5.2 client monitor feature provide about a VoWLAN client?()

    • A、RSSI of the client at the access point
    • B、WMM state
    • C、current MOS value
    • D、current RF channel
    • E、current transmit data rate

    正确答案:A,B

  • 第14题:

    Which option provides a hierarchy of data security across lines of business?()

    • A、Alerts
    • B、Multi-Org
    • C、Flexfields
    • D、Shared entities
    • E、Business Intelligence

    正确答案:B

  • 第15题:

    Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()

    • A、 Cisco Integrated Service Routers
    • B、 Cisco ASA 5500 Series Security Appliance
    • C、 CiscoWebVPN Services Module
    • D、 CiscoIPsec VPN Module

    正确答案:A

  • 第16题:

    If the VoWLAN client is a Vocera badge, which Cisco WLC parameter needs to be changed from the default value?()

    • A、DTIM
    • B、Ethernet multicast mode
    • C、peer-to-peer block mode
    • D、RF group mode
    • E、DTPC

    正确答案:B

  • 第17题:

    Which two statements regarding firewall user authentication client groups are true?()

    • A、Individual clients are configured under client groups in the configuration hierarchy.
    • B、Client groups are configured under individual clients in the configuration hierarchy.
    • C、Client groups are referenced in security policy in the same manner in which individual clients are referenced.
    • D、Client groups are used to simplify configuration by enabling firewall user authentication without security policy.

    正确答案:B,C

  • 第18题:

    You work as the exchange administrator at TestKing.com. The TestKing.com network contains two ActiveDirectory sites named TestKing1 and TestKing2. TestKing1 and TestKing2 are connected to each other bymeans of a WAN link. You receive notification during the day to plan the deployment of two Exchange Server 2010 Mailbox servers and two Client Access servers at TestKing1 and TestKing2. Every site will include a Client Accessarray. You are instruced to recommend a solution in order to deploy the Hub Transport servers. You have tomake sure that e-mail messages will be delivered to users in other sites if a Hub Transport server shouldbe fail. Your solution should also reduce the amount Exchange servers being deployed as well as supportthe deployment of the Client Access array. What should you do? ()

    • A、Your best option would be ensure that two Hub Transport severs are deployed on two new servers in TestKing1 and TestKing2.
    • B、Your best option would be add the Hub Transport server role to all Mailbox servers.
    • C、Your best option would be to ensure that a Hub Transport server is deployed on a new server.Thereafter the SMTP service should be installed on every Client Access server.
    • D、Your best option would be to add the Hub Transport server role to every Client Access server.

    正确答案:B,D

  • 第19题:

    单选题
    Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()
    A

     Security Controls

    B

     Database Access

    C

     Set Security Profile

    D

     Authorize Group Reassignment


    正确答案: D
    解析: 暂无解析

  • 第20题:

    单选题
    What is a virtual firewall?()
    A

    another name for a firewall deployed in routed mode

    B

    another name for a firewall deployed in transparent mode

    C

    a separation of multiple firewall security contexts on a single firewall

    D

    a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

    E

    a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)


    正确答案: A
    解析: 暂无解析

  • 第21题:

    单选题
    Your computer connects to both an ad hoc wireless network and a wired network. You need to allow other wireless clients to access the wired network.  What should you do? ()
    A

    Set the security type to the No authentication (Open) option.

    B

    Configure the wired and wireless network adapters as a network bridge.

    C

    Modify the wireless network profile type to the Use all-user profiles only (recommended) option.

    D

    On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.


    正确答案: C
    解析: 暂无解析

  • 第22题:

    多选题
    You are required to configure a SCREEN option that enables IP source route option detection.Which twoconfigurations meet this requirement?() (Choose two.)
    A

    [edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }

    B

    [edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }

    C

    [edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }

    D

    [edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }


    正确答案: D,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which three statements are true about load-based Call Admission Control?()
    A

    grants a VoWLAN client-initiated call based on the number of active clients associated to the accesspoint

    B

    grants a VoWLAN client-initiated call based on channel bandwidth capacity

    C

    uses the 802.11i specification

    D

    uses 802.11 action frames

    E

    requires a WMM-enabled client


    正确答案: E,C
    解析: 暂无解析

  • 第24题:

    单选题
    If the VoWLAN client is a Vocera badge, which Cisco WLC parameter needs to be changed from the default value?()
    A

    DTIM

    B

    Ethernet multicast mode

    C

    peer-to-peer block mode

    D

    RF group mode

    E

    DTPC


    正确答案: B
    解析: 暂无解析