Alerts
Multi-Org
Flexfields
Shared entities
Business Intelligence
单选题As customers deploy converged services across their business infrastructures, access routers must integrate security services and IP communications. Which router series is designed to achieve this level of integration?()ACisco 7000 Series WAN edge routersBCisco 800 Series routersCCisco Integrated Services RoutersDCisco Small Business Series routers
点击查看答案
单选题Which architecture provides a core infrastructure that allows customers to capitalize rapidly onchanging business requirements? ()A data centerB campusC branchD teleworker
单选题Which Cisco product is a software component that blocks unwanted connections and provides other gateway security functions for small business?()A Cisco Internetwork Operating System (IOS) FirewallB Cisco Secure Access Control Server (ACS)C Cisco Firewall Services Module (FWSM)D Cisco Private Internet Exchange (PIX) Firewall
单选题Which option provides a hierarchy of data security across lines of business?()A AlertsB Multi-OrgC FlexfieldsD Shared entitiesE Business Intelligence
单选题Cisco Unified Communications 500 Series for Small Business, a critical part of the Cisco SmartBusiness Communications System, is a unified communications solution for small businesses that provides voice, data, voicemail. For which technology the Cisco UC520 provides integrated WLAN connectivity to mobile clients?()Avoice onlyBdata onlyCdata and voiceDNone of above
单选题The integrated services routing architecture provides the performance, availability, and reliabilityneeded to scale mission-critical business applications in the most demanding environments.Which statement best describes the benefits of Cisco Integrated Services Routers?()AISRs provide threat defense against attacks from hackers and viruses that can occur in thenetwork.BISRs provide the framework to integrate and extend wired and wireless networksCISRs provide concurrent security, voice, data, wireless, and application optimization services.DISRS provide the common fabric, functionality, and CLI across the network.
单选题Which should be the key driver for a company security policy’s creation, implementation and enforcement?()Athe business knowledge of the IT staffBthe technical knowledge of the IT staffCthe company’s business objectivesDthe company’s network topologyEthe IT future directions