A. CST
B. MST
C. STP
D. PVST+
E. PVRST+
您可能感興趣的試卷
你可能感興趣的試題
A. Voice needs to be assigned to the hardware priority queue
B. Voice needs to be assigned to the software priority queue
C. Call signaling must have guaranteed bandwidth service
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link
E. At least 33 percent or the link bandwidth should be reserved tor default best effort class
A. EIGRP queries will be the most significant issue with respect to stability and convergence
B. EIGRP queries are not a consideration as long as EIGRP has a feasible successor with a nexthop AD that is greater than the FD of the current successor route
C. EIGRP queries will only increase the convergence time when there are no EIGRP stubsdesigned in the network
A. Routed mode requires the ACE run OSPF or EIGRP
B. Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destination
C. Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANs
D. One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
A. number of branch offices
B. number of IGP routing peers
C. remote Office and home worker throughput bandwidth requirements
D. high availability requirements
E. Supported applications
A. All the IPv6 subnets should use a /32 prefix
B. Set aside /31 prefixes to support point-to-point links and loopback interfaces
C. The IPv6 address plan should be designed to support the service block model design orintegration with IPv4
D. Designate 16 subnet bits to be split up intelligently, either by OSPF area. VLAN numbering, orIPv4 mapping
A. Filtering is only useful when combined with route summarization
B. It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networks
C. IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updates
D. The primary limitation of router filtering is that it can only be applied on outbound updates
A. Using multiple EIGRP processes
B. Tuning down the EIGRP delay parameter
C. FIGRP stub routing
D. Limiting the number of EIGRP neighbor per device
A. It is recommended to place the VPN termination device in line with the Enterprise Edge 1
B. Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
C. VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
D. Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
A. PortFast
B. UplinkFast
C. loop guard
D. root guard
E. BPDU guard
F. BackboneFast
A. Construct a hierarchical network design using EtherChannel between a server and two VDCsfrom the same physical switch
B. Utilize Cisco NSF with SSO to provide intrachassis SSO at Layers 2 to 4
C. Define the Data Center as an OSPF NSSA area, advertising a default route into the DC And summarizing the routes out of the NSSA to the Campus Core
D. Implement network services for the Data Center as a separate services layer usingactive/active model that is more predictable in failure conditions
最新試題
Which two statements about FCIP and iSCSI are correct?()
Which three of the following descriptions are true about the firewall modes? ()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
What are two characteristics of the SLB One-arm mode? ()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which signal and noise values will result in the best phone communication with an access point?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which two statements about Cisco Security Management Suite are correct? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which statement about data center access layer design modes is correct?()