Which implement phase service component describes the activities to install and test your Cisco Unified Communications solution in a nonproduction lab environment()
In which of these phases is a customer’s network assessed to determine its system readiness?()A、 PlanB、 designC、 operateD、 implement
点击查看答案
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.
Which of these correctly identifies the six phases of the Cisco Lifecycle Services framework? ()A、Prepare, Plan, Create, Implement, Operate, and ImproveB、Prepare, Plan, Design, Implement, Operate, and OptimizeC、Prepare, Plan, Design, Apply, Operate, and ManageD、Prepare, Plan, Design, Implement, Operate and Manage
Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()A、 Implement highly redundant switching and links with no single points or paths of failure.B、 Implement server load balancing.C、 Implement the Hot Standby Router Protocol (HSRP) for failover protection.D、 Implement intrusion detection with automatic notification of intrusion attempts in place.
Which of the following is the BEST way to allow web software through the server firewall?()A、Implement an application exception.B、Implement an access control list (ACL).C、Open the corporate firewall to allow port 80.D、Implement port blocking on port 80.
An administrator has been having problems with server security. Many of the servers have been infected with viruses in the past. Which of the following can be done to ensure that systems avoid OS exploits? ()A、 Implement an intrusion detection system (IDS).B、 Implement a dual-factor authentication method.C、 Implement a patch management process.D、 Implement stronger user passwords.
Which of the following memory technologies has the HIGHEST cost to implement?()A、 ECCB、 RAIDC、 PairingD、 Registered