多项选择题
Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
点击查看答案
相关考题
-
多项选择题
TheSchuylerandLivingstonIronWorkshasbeenworkingongettingitsnetworksecurityundercontrol.IthassetupVPNwithIPSeclinkstoitssuppliers.Ithasinstallednetworkvulnerabilityscannerstoproactivelyidentifyareasofweakness,anditmonitorsandrespondstosecurityeventsastheyoccur.Italsoemploysextensiveaccesscontrollists,statefulfirewall implementations,anddedicatedfirewallappliances.Thecompanyhasbeengrowingveryfastlatelyandwantstomakesureitisuptodateonsecuritymeasures.Whichtwoareasofsecuritywouldyouadvisethecompanytostrengthen?()
A. intrusion protection
B. identity
C. secure connectivity
D. security management -
单项选择题
YouarethenetworkconsultantfromCisco.com.Yourcustomerhaseightsitesandwilladdinthefuture.Branchsitetobranchsitetrafficisapproaching30percent.Thecustomer’sgoalsaretomakeiteasiertoaddbranchsitesinthefutureandtoreducetrafficthroughthehub.WhichVPNtopology shouldyourecommend?()
A. Easy VPN
B. IPsec GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN -
单项选择题
ABCCompanyhas1500manageddevicesand15,000endusersonacampusnetwork.LANManagementSolution(LMS)isbeingdeployedasthenetworkmanagementapplication.Whatis the recommendednumberofnetworkmanagementserver(s)?()
A. 1
B. 2
C. 3
D. 4
