多项选择题
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
多项选择题 TheSchuylerandLivingstonIronWorkshasbeenworkingongettingitsnetworksecurityundercontrol.IthassetupVPNwithIPSeclinkstoitssuppliers.Ithasinstallednetworkvulnerabilityscannerstoproactivelyidentifyareasofweakness,anditmonitorsandrespondstosecurityeventsastheyoccur.Italsoemploysextensiveaccesscontrollists,statefulfirewall implementations,anddedicatedfirewallappliances.Thecompanyhasbeengrowingveryfastlatelyandwantstomakesureitisuptodateonsecuritymeasures.Whichtwoareasofsecuritywouldyouadvisethecompanytostrengthen?()
单项选择题 YouarethenetworkconsultantfromCisco.com.Yourcustomerhaseightsitesandwilladdinthefuture.Branchsitetobranchsitetrafficisapproaching30percent.Thecustomer’sgoalsaretomakeiteasiertoaddbranchsitesinthefutureandtoreducetrafficthroughthehub.WhichVPNtopology shouldyourecommend?()
单项选择题 ABCCompanyhas1500manageddevicesand15,000endusersonacampusnetwork.LANManagementSolution(LMS)isbeingdeployedasthenetworkmanagementapplication.Whatis the recommendednumberofnetworkmanagementserver(s)?()