Information Technology Reference
In-Depth Information
32. A new design uses IPsec for the WA N . Which approach should be used to verify
the design?
a.
Live network
b.
Pilot network
c.
Prototype network
d.
Cable network
e.
Internet network
33. Which three is included in the design document?
a.
Design details
b.
Design requirements
c.
Current cable runs
d.
List of Layer 2 devices
e.
Implementation plan
Search WWH ::




Custom Search