A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
您可能感興趣的試卷
你可能感興趣的試題
A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U
A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information
A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
A. OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
B. IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
C. QoS requirements with MPLS-VPN must be implemented by the service provider
D. Hierarchical VPLS designs are the least scalable
E. IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required
A. FHRP to remote branches.
B. Layer 3 MPLS VPNs routing.
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
A. device visualization
B. device clustering
C. server visualization
D. network visualization
A. iBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetwork
B. iBGP requires a full mesh of eBGP peers
C. Routers will not advertise iBGP learned routers to other iBGP peers.
D. The use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGP
E. iGBP peers do not add any information to the AS path
A. DPT
B. MPLS
C. VPLS
D. CWDM
E. DWDM
F. SONET/SDH
最新試題
What are two characteristics of OER? ()
Which two of these correctly describe Fibre Channel?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which two statements about Cisco Security Management Suite are correct? ()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
Which two statements about an interface configured with the asr-group command are correct? ()
Which statement about data center access layer design modes is correct?()
Which two statements about Network Attached Storage are correct?()
What is the traditional mode for a firewall?()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()