單項選擇題What is the most common mode for a firewall?()

A. routed mode
B. context mode
C. bridged mode
D. transparent mode
E. full security mode


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題How does the Ethernet Relay Service use the VLAN tag?()

A. to provide service internetworking
B. to support transparency for Layer 2 frames
C. as a connection identifier to indicate destination
D. as a mapping to the DLCI in service internetworking
E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites

2.單項選擇題Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()

A. Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.
B. “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.
C. Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.
D. Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.

3.單項選擇題When designing the Network Admission Control (NAC) Appliance for the Enterprise Campus Network, which of the following requirements would help the designer to narrow down the NAC choices, from Virtual Gateway to Real IP Gateway, or from In-band to Out-band?()

A. QoS ToS/DSCP values are required to be forwarded transparently
B. Device redundancy is required
C. Per-user ACL support is required
D. Multicast service support is required

4.多項選擇題What are two characteristics of Server Load Balancing router mode?()

A. The design supports multiple server subnets Cisco 642-874: Practice Exam
B. An end-user sees the IP address of the real server
C. SLB routes between the outside and inside subnets
D. The source or destination MAC address is rewritten, but the IP addresses left alone
E. SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices

5.多項選擇題Which two statements about SCSI are true? ()

A. The bus is limited to 32 devices
B. It is a full duplex serial standard
C. It is a half-duplex serial standard
D. It allows up to 320 MB/s of shared channel bandwidth

6.多項選擇題Which two statements about layer 3 access designs are correct?()

A. IP address space is difficult to manage.
B. Broadcast and fault domains arc increased
C. Convergence time is fractionally slower than STP
D. Limits on clustering and NIC teaming are removed
E. Fast uplink convergence is supported tor failover and fallback

7.單項選擇題When is a first-hop redundancy protocol needed in the distribution layer?()

A. when the design implements Layer 2 between the access arid distribution blocks
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution blocks
F. when the design implements Layer 2 between the access and distribution blocks

8.多項選擇題From a design perspective which two of the following OHPF Statements are most relevant?()

A. OSPF stub areas can be thought of as a simple form of summarization
B. OSPF cannot filter intra area routes
C. An ARR ran only exist in two areas - the backbone and one adjacent area
D. Performance issues in the Backbone area can be offset by allowing some traffic to transit anon-backbone area
E. the size of an area (the LSDB) will be constrained by the size of the IP MTU

9.單項選擇題When an Enterprise Campus network designer is addressing the merger of two companies with different IGPs, which of the following is considering a super routing design?()

A. Eliminate the management and support for redistribution by choosing and cutting over to asingle IGP at the time of merger
B. Maintain distinct pockets across a moving boundary of routing protocols, redistributing betweenthem
C. Manipulate the administrative distance of the different IGPs to be equal throughout the network
D. Leave the IGPs independent without redistribution wherever communication between companyentities is not required

10.單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed? ()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers

最新試題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項選擇題

Which path selection protocol is used by Fibre Channel fabrics?()

題型:單項選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項選擇題

What are two characteristics of the SLB One-arm mode? ()

題型:多項選擇題

What amount of cell overlap ensures smooth roaming for wireless endpoints?()

題型:單項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()

題型:多項選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

In which two locations in an enterprise network can an IPS sensor be placed? ()

題型:多項選擇題