单项选择题
As customers deploy converged services across the business infrastructure, access routers must integrate security services and IP communications. Which router series extends intelligent networking to remote branches and offices?()
A. Cisco 700 Series ISDN Access Routers
B. Cisco Integrated Services Routers
C. Cisco 3700 Series Multiservice Access Routers
D. Cisco 1700 Series Modular Access Routers
相关考题
-
单项选择题
CiscoUnifiedCommunications500SeriesforSmallBusiness,acriticalpartoftheCiscoSmartBusinessCommunicationsSystem,isaunifiedcommunicationssolutionforsmallbusinessesthat providesvoice,data,voicemail.ForwhichtechnologytheCiscoUC520providesintegratedWLAN connectivitytomobileclients?()
A. voice only
B. data only
C. data and voice
D. None of above -
多项选择题
CiscoUnifiedCommunications500SeriesforSmallBusiness,acriticalpartoftheCiscoSmart BusinessCommunicationsSystem,isaunifiedcommunicationssolutionforsmallbusinessesthat providesvoice,data,voicemail.WhichthreefeaturesdoestheCiscoUC520support?()
A. distributed routing
B. Cisco Unity Express
C. security, firewall and VPN
D. analog devices -
多项选择题
Youaremeetingwithacustomerwhoisconcernedaboutimprovingemployeeproductivity.WhataretwowaysthatyoushouldpositiontheCiscoSDNwiththiscustomer?()
A. A Cisco Integrated Security Solution uses the Cisco UN to form a layered and integratednetwork of protection that enables the enforcement of security policies throughout theinfrastructure.
B. A Cisco Integrated Security Solution provides software tools that allow customers to centrallymanage their network security policies.
C. in contrast to point products, the Cisco SDN is a system of defense that leverages the ubiquitous sensing and control capabilities of the network. Each part communicates with the otherto strengthen protection across the entire infrastructure.
D. A Cisco Integrated Security Solution enables barriers that serve as both physical and virtualprotection against possible threats. Security barriers include firewalls, authentication products,access control products, and tunneling and encryption techniques.
