A.NetFlow uses five key fields for the flow
B.NBAR examines data in Layers 3 and 4
C.NetFlow examines data in Layers 3 and 4
D.NBAR examines data in Layers 2 through 4
E.NetFlow examines data in Layers 2 through 4
您可能感興趣的試卷
你可能感興趣的試題
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
A.They do not receive unique IP addresses
B.RADIUS or LDAP is required in order to assign IP addresses
C.They are assigned addresses from the internal DHCP pool
D.Their traffic appears to originate from the originating host network
A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode
A.0.1%
B.1%
C.2.5%
D.25%
A.use ISL encapsulation
B.use 802.1q encapsulation
C.set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D.use VTP server mode to support dynamic propagation of VLAN information across the network
E.set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation
A.only the low-order 23 bits of the MAC address are used to map IP addresses
B.only the low-order 24 bits of the MAC address are used to map IP addresses
C.only the high-order 23 bits of the MAC address are used to map IP addresses
D.only the low-order 23 bits of the IP address are used to map MAC addresses
E.the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F.the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.
A.Easy VPN
B.GRE tunneling
C.Virtual Tunnel Interfaces
D.Dynamic Multipoint VPN
E.Group Encrypted Transport VPN
A.to ensure a loop-free topology
B.to protect against user-side loops
C.in order to support business applications
D.because of the risk of lost connectivity without STP
E.for the most deterministic and highly available network topology
最新試題
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
Which technology allows centralized storage services to be shared across different VSANs?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
Which three of these are important when determining NAS Server scaling? ()