A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
您可能感興趣的試卷
你可能感興趣的試題
A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.
A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.
Which two characteristics are true of a firewall running in routed mode based on the following information?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.
A. dial plans
B. dialed numbers
C. voice mail prompts
D. phone features
A. EIGRP can summarize per interface.
B. OSPF router databases remain independent.
C. When they are configured with stubs, EIGRP regularly floods the topology.
D. OSPF topology decisions are made independent of hierarchy or area.
A. close to the servers
B. close to the end users
C. at the Internet edge
D. in front of web server farms
A. termination devices need routable addresses inside the VPN
B. termination devices need not routable addresses inside the VPN
C. IGP routing protocols will update their routing tables over an IPsec VPN
D. addressing designs need to allow for summarization
A. bandwidth
B. number of plug-ins per scan
C. total number of network devices
D. number of checks in each posture assessment
A. dynamic reconfiguration
B. path MTU discovery
C. auto setup
D. remote management
最新試題
Which three of the following descriptions are true about the firewall modes? ()
Which two statements about Network Attached Storage are correct?()
What is the traditional mode for a firewall?()
Which two of these correctly describe asymmetric routing and firewalls? ()
What are two characteristics of GSS? ()
Which statement about data center access layer design modes is correct?()
Which signal and noise values will result in the best phone communication with an access point?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()