Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication
Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through
Layer 3 with Layer 3 Security set to VPN Pass-Through
Layer 2 with Layer 2 Security set to 802.1X
第1题:
Which two statements regarding firewall user authentication client groups are true?() (Choose two.)
第2题:
Which two firewall user authentication objects can be referenced in a security policy?()
第3题:
After a client has developed a security policy, what is recommended that they do next?()
第4题:
What is a virtual firewall?()
第5题:
Which menu option must be used to grant a user the authority to add or remove users to one or more Security Groups?()
第6题:
You are a help desk technician for your company. Susan is an executive. Because Susan travels frequently, she uses a Windows XP Professional portable computer that has a smart card reader. Susan asks you to configure her computer so that she can dial in to the company network when she is out of the office. Company security policy states that dial-in users must use a smart card when they connect to the network, and that the users must use the strongest form of data encryption possible. Company security policy also states that client computers must disconnect if the Routing and Remote Access server does not support both smart card authentication and the strongest possible authentication. You need to configure the dial-up connection properties on Susan’s computer to dial in to the company network. Your solution must ensure that company security policies are enforced. Which three actions should you perform?()
第7题:
Cisco Integrated Service Routers
Cisco ASA 5500 Series Security Appliance
CiscoWebVPN Services Module
CiscoIPsec VPN Module
第8题:
Alerts
Multi-Org
Flexfields
Shared entities
Business Intelligence
第9题:
Modify the GPO to change the Driver Signing option.
Run theSigverifcommand on each client computer.
Reconfigure the Driver Signing option on each client computer. Install the driver on each client computer. Reapply the security template settings on each client computer.
Modify the Hisecws.inf security template on each client computer to change the Driver Signing option.
Modify the Hisecws.inf security template on the domain controller to change the Driver Signing option.
第10题:
A client group is a list of clients associated with a group.
A client group is a list of groups associated with a client.
Client groups are referenced in security policy in the same manner in which individual clients are referenced.
Client groups are used to simplify configuration by enabling firewall user authentication without security policy.
第11题:
Layer 3 with Layer 3 Security set to None and Web Policy set to Authentication
Layer 3 with Layer 3 Security set to None and Web Policy set to VPN Pass-Through
Layer 3 with Layer 3 Security set to VPN Pass-Through
Layer 2 with Layer 2 Security set to 802.1X
第12题:
RSSI of the client at the access point
WMM state
current MOS value
current RF channel
current transmit data rate
第13题:
Which two pieces of information does the Cisco WLC v5.2 client monitor feature provide about a VoWLAN client?()
第14题:
Which option provides a hierarchy of data security across lines of business?()
第15题:
Which security-enabled device is recommended to provide a site-to-site IPsec VPN solution, but not SSL?()
第16题:
If the VoWLAN client is a Vocera badge, which Cisco WLC parameter needs to be changed from the default value?()
第17题:
Which two statements regarding firewall user authentication client groups are true?()
第18题:
You work as the exchange administrator at TestKing.com. The TestKing.com network contains two ActiveDirectory sites named TestKing1 and TestKing2. TestKing1 and TestKing2 are connected to each other bymeans of a WAN link. You receive notification during the day to plan the deployment of two Exchange Server 2010 Mailbox servers and two Client Access servers at TestKing1 and TestKing2. Every site will include a Client Accessarray. You are instruced to recommend a solution in order to deploy the Hub Transport servers. You have tomake sure that e-mail messages will be delivered to users in other sites if a Hub Transport server shouldbe fail. Your solution should also reduce the amount Exchange servers being deployed as well as supportthe deployment of the Client Access array. What should you do? ()
第19题:
Security Controls
Database Access
Set Security Profile
Authorize Group Reassignment
第20题:
another name for a firewall deployed in routed mode
another name for a firewall deployed in transparent mode
a separation of multiple firewall security contexts on a single firewall
a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
第21题:
Set the security type to the No authentication (Open) option.
Configure the wired and wireless network adapters as a network bridge.
Modify the wireless network profile type to the Use all-user profiles only (recommended) option.
On each wireless client, set the Service Set Identifier (SSID) for a new wireless network to the name of your wired network adapter.
第22题:
[edit security screen] user@host# show ids-option protectFromFlood { ip { loose-source-route-option; strict-source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { source-route-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { record-route-option; security-option; } }
[edit security screen] user@host# show ids-option protectFromFlood { ip { strict-source-route-option; record-route-option; } }
第23题:
grants a VoWLAN client-initiated call based on the number of active clients associated to the accesspoint
grants a VoWLAN client-initiated call based on channel bandwidth capacity
uses the 802.11i specification
uses 802.11 action frames
requires a WMM-enabled client
第24题:
DTIM
Ethernet multicast mode
peer-to-peer block mode
RF group mode
DTPC