多項(xiàng)選擇題

Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()

A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

2.多項(xiàng)選擇題What are two design guidelines for VoIP networks? ()

A.Delay should be no more than 10 ms.
B.Loss should be no more than1 percent.
C.Jitter should be less then 40 ms.
D.Managed bandwidth is strongly recommended for voice control traffic.

3.多項(xiàng)選擇題Which three of these are elements of the Cisco Unified Wireless Network architecture?()

A.cell phones
B.remote access
C.mobility services
D.network management
E.network unification
F.network decentralization

5.單項(xiàng)選擇題Which of these Layer 2 access designs does not support VLAN extensions?()

A.FlexLinks
B.loop-free U
C.looped square
D.looped triangle
E.loop-free inverted U

7.多項(xiàng)選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

8.多項(xiàng)選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

9.單項(xiàng)選擇題When is the site-to-site remote access model appropriate? ()

A. for multiple ISDN connections
B. for modem concentrated dial-up connections
C. for a group of users in the same vicinity sharing a connection
D. for use by mobile users

10.多項(xiàng)選擇題Which two design concerns must be addressed when designing a multicast implementation?()

A. only the low-order 23 bits of the MAC address are used to map IP addresses
B. only the low-order 24 bits of the MAC address are used to map IP addresses
C. only the high-order 23 bits of the MAC address are used to map IP addresses
D. only the low-order 23 bits of the IP address are used to map MAC addresses
E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses




最新試題

Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()

題型:單項(xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()

題型:單項(xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:單項(xiàng)選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:單項(xiàng)選擇題

In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()

題型:單項(xiàng)選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項(xiàng)選擇題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項(xiàng)選擇題

What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

題型:單項(xiàng)選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項(xiàng)選擇題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項(xiàng)選擇題