多項(xiàng)選擇題Which three objectives would be met by designing Layer 3 switching in the Campus Backbone of amedium size installation? ()

A. scale to a large size
B. increase router peering
C. provide a flexible topology with no spanning tree loops
D. control broadcasts in the backbone


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()

A. IPSec in tunnel mode
B. IPSec in transport mode
C. GRE with IPSec in transport mode
D. GRE with IPSec in tunnel mode

2.單項(xiàng)選擇題It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()

A. single layer of firewalling
B. multiple layers of firewalling
C. firewall connections in either an active or standby state
D. an architecture in which all traffic between firewalls goes through application-specific servers

4.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which statement is correct regarding NBARand NetFlow?()

A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.

6.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientlessend-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.

7.多項(xiàng)選擇題What are two design guidelines for VoIP networks?()

A. Delay should be no more than 10 ms.
B. Loss should be no more than 1 percent.
C. Jitter should be less then 40 ms.
D. Managed bandwidth is strongly recommended for voice control traffic.

9.多項(xiàng)選擇題What are three primary activities in the cycle of building an enterprise security strategy?()

A. activity audit
B. administration
C. policy establishment
D. technology implementation

10.多項(xiàng)選擇題Which two of these are recommended practices with trunks? ()

A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network 
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.

最新試題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項(xiàng)選擇題

What are two characteristics of OER? ()

題型:多項(xiàng)選擇題

What are two characteristics of the SLB One-arm mode? ()

題型:多項(xiàng)選擇題

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

題型:單項(xiàng)選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項(xiàng)選擇題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項(xiàng)選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項(xiàng)選擇題

Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

題型:多項(xiàng)選擇題

Which path selection protocol is used by Fibre Channel fabrics?()

題型:單項(xiàng)選擇題