When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?
When designing the threat detection and mitigation portion for the enterprise data center network, which of the following would be the most appropriate solution to consider?A . 802.1XB . ACLs in the core layerC . Cisco Security MARSD . Cisco Firewall Services ModuleView AnswerAnswer: C
Which three options represents the components of the Teleworker Solution? (Choose three.)
Which three options represents the components of the Teleworker Solution? (Choose three.)A . Cisco Unified IP PhoneB . Cisco 880 Series RouterC . Aironet Office Extend Access PointD . Catalyst 3560 Series SwitchE . Cisco 2900 Series RouterF . MPLS Layer 3 VPNG . Leased linesView AnswerAnswer: ABC
Which WLC interface is dedicated for WLAN client data?
Which WLC interface is dedicated for WLAN client data?A . virtual interfaceB . dynamic interfaceC . management interfaceD . AP manager interfaceE . service port interfaceView AnswerAnswer: B Explanation: WLC Interface Types A WLC has five interface types: ■ Management interface (static, configured at setup, mandatory) is used for in-band...
If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport?
If a teleworker is required to access the branch office via a secure IPSEC VPN connection, which technology is recommended to provide the underlying transport?A . ISDNB . Metro EthernetC . Frame RelayD . ADSLE . ATMView AnswerAnswer: D
What is the acceptable amount of one-way network delay for voice and video applications?
What is the acceptable amount of one-way network delay for voice and video applications?A . 300 bytesB . 1 secC . 150 msD . 500 msView AnswerAnswer: C Explanation: Delay Components in VoIP Networks The ITU's G.I 14 recommendation specifics that the one-way delay between endpoints should not exceed 150...
Click and drag the phases of the PPDIOO network lifecycle approach on the left to their order on the right
DRAG DROP Click and drag the phases of the PPDIOO network lifecycle approach on the left to their order on the right. View AnswerAnswer:
Which of these is the equation used to derive a 64 Kbps bit rate?
Which of these is the equation used to derive a 64 Kbps bit rate?A . 2 x 8 kHz x 4-bit code wordsB . 8 kHz x 8-bit code wordsC . 2 x 4-bit code words x 8 kHzD . 2 x 4 kHz x 8-bit code wordsView AnswerAnswer: D...
Which is the most important consideration when passing corporate traffic over the public Internet?
WAN backup over the Internet is often used to provide primary connection redundancy. Which is the most important consideration when passing corporate traffic over the public Internet?A . securityB . static versus dynamic routingC . bandwidthD . QoSE . latencyView AnswerAnswer: A Explanation: WAN Backup over the Internet Another alternative...
Which two common cable management strategies are used in high-density server deployments in the data center? (Choose two.)
Which two common cable management strategies are used in high-density server deployments in the data center? (Choose two.)A . top-of-rackB . middle-of-rackC . bottom-of-rackD . beginning-of-rowE . middle-of-rowF . end-of-rowView AnswerAnswer: AF
Which is a factor in enterprise campus design decisions?
Which is a factor in enterprise campus design decisions?A . network application characteristicsB . routing protocol characteristicsC . switching latency characteristicsD . packet filtering characteristicsView AnswerAnswer: A