A. transparent
B. proxy
C. reverse proxy
D. direct
您可能感興趣的試卷
你可能感興趣的試題
A. Flex Links
B. loop-free U
C. looped square
D. looped triangle
E. loop-free inverted U
A. scale to a large size
B. increase router peering
C. provide a flexible topology with no spanning tree loops
D. control broadcasts in the backbone
A.Flex Links
B.loop-free U
C.looped square
D.looped triangle
E.loop-free inverted U
A.by tracking the status of objects along the path to the e-commerce module
B.by detecting undesirable conditions along the path to the e-commerce module
C.by using the MED to communicate the site preferences for traffic to multiple ISPs
D.by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E.by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
A.multiple layers of firewalling
B.a method of operating firewalls from multiple vendors
C.firewall connections in either an active or standby state
D.an architecture in which all traffic between firewalls goes through application-specific servers
E.an architecture in which all traffic between firewalls goes through application-specific gateways
A.NetFlow uses five key fields for the flow
B.NBAR examines data in Layers 3 and 4
C.NetFlow examines data in Layers 3 and 4
D.NBAR examines data in Layers 2 through 4
E.NetFlow examines data in Layers 2 through 4
A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB
A.They do not receive unique IP addresses
B.RADIUS or LDAP is required in order to assign IP addresses
C.They are assigned addresses from the internal DHCP pool
D.Their traffic appears to originate from the originating host network
A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode
A.0.1%
B.1%
C.2.5%
D.25%
最新試題
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Which technology allows centralized storage services to be shared across different VSANs?()
Which of the following is the primary consideration to scale VPNs?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()