單項選擇題Which of these recommendations is most appropriate for the Cisco Campus Architecture?()

A. Utilize Layer 3 switching.
B. Utilize software accelerated services.
C. Aggregate end users and support a feature-rich environment.
D. Perform packet manipulation and filtering at the core layer.
E. Use redundant point-to-point Layer 2 interconnections when there is a link or node failure.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題In a base e-Commerce module design, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

3.多項選擇題Flex Links are a pair of a Layer 2 interfaces (switchports or port channels), where one interface is configured to act as a backup to the other. Which two statements are correct regarding Flex Links?()

A. An interface can only belong to single Flex Links.
B. An interface can belong to multiple Flex Links.
C. Flex Links operate only over single pairs of links.
D. Flex Links automatically disable STP so no BPDUs are propagated.

4.多項選擇題What four functions does Web Cache Communication Protocol (WCCP) incorporate?()

A. load balancing
B. scalability
C. remote management
D. fault tolerance
E. service assurance

6.單項選擇題Scalability is provided in the server farm module by which of the following design strategies?()

A. up to 10Gbps of bandwidth at the access level
B. redundant servers at the access level
C. modular block design at the access level
D. high port densities at the access level

8.單項選擇題To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()

A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode

9.單項選擇題A network vulnerability scanner is part of which critical element of network and system security?()

A. host security
B. perimeter security
C. security monitoring
D. policy management

10.單項選擇題You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

最新試題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項選擇題

Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()

題型:單項選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:單項選擇題

One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()

題型:單項選擇題

Which three of these are important when determining NAS Server scaling? ()

題型:多項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

Which of these is true of a Layer 3 out-of-band NAS deployment?()

題型:單項選擇題