QUESTION 25
What are the selection criteria for switching and routing protocols? (Select four.)
The latest version |
||
Support for authentication |
||
Network traffic characteristics |
||
The capability to adapt to changes quickly |
||
Bandwidth, memory, and CPU usage |
QUESTION 26
Security management provides the following: (Select four)
Analyze router, switch, and server configurations for compliance with security policies and procedures. |
||
Generate, distribute, and store encryption keys. |
||
Analyze bandwidth and memory consumption. |
||
Find abusers who use more resources than they should. |
QUESTION 26
Security management provides the following: (Select four)
Analyze router, switch, and server configurations for compliance with security policies and procedures. |
||
Generate, distribute, and store encryption keys. |
||
Analyze bandwidth and memory consumption. |
||
Find abusers who use more resources than they should. |
QUESTION 27
Which of the following should be considered when securing public servers in design phase? (Select three.)
Place servers in a DMZ that is protected via firewalls |
||
Run many services on each server instance |
||
Run a firewall on the server itself |
||
Run dynamic routing protocol with authentication |
||
Use reliable operating systems with the latest security patches |
QUESTION 28
What are the benefits of using hierarchical model to design network topology? (Select four.)
Constrains broadcast domains |
||
Facilitates scaling to a larger size |
||
Increases workload on network devices |
||
Facilitates changes |
||
Enhances simplicity and understanding |
QUESTION 29
Which of the following should be considered when checking the health of the existing enterprise network? (Select three.)
Bandwidth utilization |
||
Renewal of licence |
||
Response time |
||
Budget on network extension |
||
Status of major routers, switches, and firewalls |
QUESTION 25
The main criteria for selecting Switching and Routing protocols
1.Network traffic characteristics
2.Support for authentication
3.The capability to adapt to changes quickly
4.Bandwidth, memory, and CPU usage
QUESTION 27
The following should be considered when securing public servers in design phase
1.Run a firewall on the server itself
2.Run dynamic routing protocol with authentication
3.Use reliable operating systems with the latest security patches
QUESTION 28
The benefits of using hierarchical model to design network topology
1.Facilitates scaling to a larger size
In hierarchical model, the module in each instance is consistent,so expansion is easy to implement.
2.Enhances simplicity and understanding
3.Facilitates changes
4.Constrains broadcast domains
QUESTION 29
When checking the health of the existing enterprise network,the following criteria should be considered
1.Budget on network extension
2.Status of major routers, switches, and firewalls
3.Bandwidth utilization
Get Answers For Free
Most questions answered within 1 hours.