A.another name for a firewall deployed in routed mode
B.another name for a firewall deployed in transparent mode
C.a separation of multiple firewall security contexts on a single firewall
D.a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E.a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
您可能感興趣的試卷
你可能感興趣的試題
A.bridging VLANs on two switches
B.bridging two VLANs on one switch
C.between two Layer 2 devices with trunking
D.between two Layer 2 devices without trunking
E.between a Layer 2 device and a Layer 3 device with trunking
A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers
A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network
A. Employ path MTU discovery.
B. Set the MTU higher than 1500 bytes.
C. Turn off pre-fragmentation for IPSec.
D. Set the MTU value to 1400 bytes.
A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio
Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()
A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization
A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.
A.Delay should be no more than 10 ms.
B.Loss should be no more than1 percent.
C.Jitter should be less then 40 ms.
D.Managed bandwidth is strongly recommended for voice control traffic.
A.cell phones
B.remote access
C.mobility services
D.network management
E.network unification
F.network decentralization
A.DTP
B.RPR
C.SDH
D.CWDM
E.DWDM
最新試題
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Which technology allows centralized storage services to be shared across different VSANs?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()