A. Ethernet Private Line
B. Ethernet Wire Service
C. Ethernet Relay Service
D. Ethernet Multipoint Service
E. Ethernet Relay Multipoint Service
您可能感興趣的試卷
你可能感興趣的試題
A. Ethernet Private Line
B. Ethernet Wire Service
C. Ethernet Relay Service
D. Ethernet Multipoint Service
E. Ethernet Relay Multipoint Service
A. NAC can authenticate using 802.1X and IBNS cannot
B. NAC can ensure only compliant machines connect and IBNS cannot
C. NAC can ensure access to the correct network resources and IBNS cannot
D. NAC can manage user mobility and reduce overhead costs and IBNS cannot
A. Layer 2
B. Layer 3
C. in-band
D. out-of-band
E. edge
F. central
A. Thin Model
B. Thick Client
C. Port Forwarding
D. Clientless Access
E. Layer 3 Network Access
A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.
A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than onesecond.
E. NSF and SSO with redundant supervisors have the most impact on outages at the accesslayer.
A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall
A. RX-queue deferred
B. TX-queue deferred
C. RX-queue saturation
D. TX-queue saturation
E. RX-queue starvation
F. TX-queue starvation
Which two practices will avoid Cisco Express Forwarding polarization?()
A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.
最新試題
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
Which signal and noise values will result in the best phone communication with an access point?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which two statements about an interface configured with the asr-group command are correct? ()
What is the recommended radius of a cell for a voice-ready wireless network?()
What are two characteristics of the SLB One-arm mode? ()
What is the traditional mode for a firewall?()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which two statements about FCIP and iSCSI are correct?()