Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
您可能感興趣的試卷
你可能感興趣的試題
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
A. They are known as fabric routing.
B. They cannot span multiple switches.
C. Their connectivity is supported by Layer 2.
D. They enable devices in different VSAN fabrics to communicate.
E. They require that multiple switch fabrics be merged before they can function.
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. TheiSCSI stack supports block-level storage for remote devices.
E. The purpose ofiSCSI is to provide connectivity between separate wide-area SANs.
A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D.allI S Lscontained with inasingle chass is
E.higher latency and through put than acore-edged esign switch
A.IVR
B.VoQ
C.FSPF
D.VSANs
E.SANTap
A.ISL
B.IVR
C.VoQ
D.VSANs
E.EnhancedISL
A. It operates much like TCP.
B. Flow control is only provided by QoS.
C. It must be implemented in an arbitrated loop.
D. Communication methods are similar to those of an Ethernet bus.
E. N_Port to N_Port connections use logical node connection points.
A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to100 km before needing extenders
A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.
A. Create a class that inherits HtmlTextWriter and that can emit the new markup.
B. Create a class that inherits StreamWriter and that can emit the new markup.
C. Reference the class in the <capabilities> element of the new device's browser definition file.
D. Reference the class in the <controlAdapters> element of the new device's browser definition file.
最新試題
Which two of these are advantages of placing the VPN device parallel to the firewall?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links
During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()
Which signal and noise values will result in the best phone communication with an access point?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()