A.Flex Links
B.loop-free U
C.looped square
D.looped triangle
E.loop-free inverted U
您可能感興趣的試卷
你可能感興趣的試題
A.by tracking the status of objects along the path to the e-commerce module
B.by detecting undesirable conditions along the path to the e-commerce module
C.by using the MED to communicate the site preferences for traffic to multiple ISPs
D.by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E.by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
A.multiple layers of firewalling
B.a method of operating firewalls from multiple vendors
C.firewall connections in either an active or standby state
D.an architecture in which all traffic between firewalls goes through application-specific servers
E.an architecture in which all traffic between firewalls goes through application-specific gateways
A.NetFlow uses five key fields for the flow
B.NBAR examines data in Layers 3 and 4
C.NetFlow examines data in Layers 3 and 4
D.NBAR examines data in Layers 2 through 4
E.NetFlow examines data in Layers 2 through 4
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
A.They do not receive unique IP addresses
B.RADIUS or LDAP is required in order to assign IP addresses
C.They are assigned addresses from the internal DHCP pool
D.Their traffic appears to originate from the originating host network
A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode
A.0.1%
B.1%
C.2.5%
D.25%
A.use ISL encapsulation
B.use 802.1q encapsulation
C.set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D.use VTP server mode to support dynamic propagation of VLAN information across the network
E.set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation
A.only the low-order 23 bits of the MAC address are used to map IP addresses
B.only the low-order 24 bits of the MAC address are used to map IP addresses
C.only the high-order 23 bits of the MAC address are used to map IP addresses
D.only the low-order 23 bits of the IP address are used to map MAC addresses
E.the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F.the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
最新試題
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
Which technology allows centralized storage services to be shared across different VSANs?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which three of these are important when determining NAS Server scaling? ()
Which signal and noise values will result in the best phone communication with an access point?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()