Designing Scalable Networks

Table of Contents

Table of Contents

Module 2 - Design the Network Structure

Section 6 - Provision Software Features

Jones, Jones, & Jones: Solution

  1. Mr. Jones has been reading about hackers accessing confidential data by hacking into the network from the Internet. How have you addressed his concerns with your design?

Click on the Back button in your browser to review Section 6 of Module 2. If you are finished with that section, click here to go on to Section 7.


Copyright Cisco Systems, Inc. -- Version 2.0 7/98