單項(xiàng)選擇題In a base e-Commerce module design, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.


您可能感興趣的試卷

你可能感興趣的試題

2.多項(xiàng)選擇題Flex Links are a pair of a Layer 2 interfaces (switchports or port channels), where one interface is configured to act as a backup to the other. Which two statements are correct regarding Flex Links?()

A. An interface can only belong to single Flex Links.
B. An interface can belong to multiple Flex Links.
C. Flex Links operate only over single pairs of links.
D. Flex Links automatically disable STP so no BPDUs are propagated.

3.多項(xiàng)選擇題What four functions does Web Cache Communication Protocol (WCCP) incorporate?()

A. load balancing
B. scalability
C. remote management
D. fault tolerance
E. service assurance

5.單項(xiàng)選擇題Scalability is provided in the server farm module by which of the following design strategies?()

A. up to 10Gbps of bandwidth at the access level
B. redundant servers at the access level
C. modular block design at the access level
D. high port densities at the access level

6.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

A. InterSwitch Link
B. Virtua LAN
C. Virtual Output Queuing
D. virtual storage area network

7.單項(xiàng)選擇題To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()

A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode

8.單項(xiàng)選擇題A network vulnerability scanner is part of which critical element of network and system security?()

A. host security
B. perimeter security
C. security monitoring
D. policy management

9.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

最新試題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項(xiàng)選擇題

Which technology allows centralized storage services to be shared across different VSANs?()

題型:單項(xiàng)選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項(xiàng)選擇題

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

題型:單項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項(xiàng)選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項(xiàng)選擇題

Which three of these are important when determining NAS Server scaling? ()

題型:多項(xiàng)選擇題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:單項(xiàng)選擇題

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

題型:單項(xiàng)選擇題

Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()

題型:單項(xiàng)選擇題