A.routed mode
B.context mode
C.bridged mode
D.transparent mode
E.full security mode
您可能感興趣的試卷
你可能感興趣的試題
A. It helps verify end-to-end path availability.
B. It provides traffic rerouting in case of disaster.
C. HSRP, GLBP, and VRRP can be clients of GSS.
D. BGP must be the routing protocol between the distributed data centers.
E. DNS responsiveness is improved by providing centralized domain management.
A. It can take on HSRP, VRRP, and GLBP as clients.
B. It provides automatic inbound route optimization.
C. Path selection may be based on delay, loss, or jitter.
D. The border router makes decisions about which outbound path to use.
E. Automatic load distribution is provided for multiple connections.
A. The design supports multiple server subnets.
B. An end-user sees the IP address of the real server.
C. SLB routes between the outside and inside subnets.
D. The source or destination MAC address is rewritten, but the IP addresses left alone.
E. SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices.
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
A. They are known as fabric routing.
B. They cannot span multiple switches.
C. Their connectivity is supported by Layer 2.
D. They enable devices in different VSAN fabrics to communicate.
E. They require that multiple switch fabrics be merged before they can function.
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. TheiSCSI stack supports block-level storage for remote devices.
E. The purpose ofiSCSI is to provide connectivity between separate wide-area SANs.
A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D.allI S Lscontained with inasingle chass is
E.higher latency and through put than acore-edged esign switch
A.IVR
B.VoQ
C.FSPF
D.VSANs
E.SANTap
A.ISL
B.IVR
C.VoQ
D.VSANs
E.EnhancedISL
最新試題
What is the recommended radius of a cell for a voice-ready wireless network?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()