A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network
您可能感興趣的試卷
你可能感興趣的試題
A. IP telephony
B. security
C. IP multicasting
D. QoS
A. echo
B. jitter
C. packet loss
D. digitized sampling
A. dynamic reconfiguration
B. path MTU discovery
C. auto setup
D. remote management
Which two of these are correct regarding the recommended practice for distribution layer designbased on the following configuration?()
A. use a Layer 2 link between distribution switches
B. use a Layer 3 link between distribution switches
C. use a redundant link to the core
D. use a Layer 3 link between distribution switches with route summarization
A. regions
B. partitions
C. locations
D. device Pools
A. network unification
B. remote access
C. mobility services
D. network management
A. multiple Frame Relay PVCs
B. dual Wan links to the regional office
C. dual Wan links to another branch office
D. single links - one to the regional office and one to another branch office
A. Dynamic Trunking Protocol
B. Resilient Packet Ring
C. Synchronous Digital Hierarchy
D. Coarse Wave Division Multiplexing
A. availability
B. performance
C. functionality
D. manageability
A. Use default Layer 4 hash in core.
B. Use default Layer 3 hash in distribution.
C. Use default Layer 4 hash in distribution.
D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
最新試題
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which two statements about Network Attached Storage are correct?()
Which two statements about Cisco Security Management Suite are correct? ()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which two statements about an interface configured with the asr-group command are correct? ()
Which three of the following descriptions are true about the firewall modes? ()