多項(xiàng)選擇題Which two statements about an interface configured with the asr-group command are correct?()

A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which three of the following descriptions are true about the firewall modes? ()

A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.

2.單項(xiàng)選擇題What is the traditional mode for a firewall?()

A.routed mode
B.context mode
C.bridged mode
D.transparent mode
E.full security mode

3.多項(xiàng)選擇題What are two characteristics of GSS?()

A. It helps verify end-to-end path availability.
B. It provides traffic rerouting in case of disaster.
C. HSRP, GLBP, and VRRP can be clients of GSS.
D. BGP must be the routing protocol between the distributed data centers.
E. DNS responsiveness is improved by providing centralized domain management.

4.多項(xiàng)選擇題What are two characteristics of OER? ()

A. It can take on HSRP, VRRP, and GLBP as clients.
B. It provides automatic inbound route optimization.
C. Path selection may be based on delay, loss, or jitter.
D. The border router makes decisions about which outbound path to use.
E. Automatic load distribution is provided for multiple connections.

5.多項(xiàng)選擇題What are two characteristics of SLB router mode?()

A. The design supports multiple server subnets.
B. An end-user sees the IP address of the real server.
C. SLB routes between the outside and inside subnets.
D. The source or destination MAC address is rewritten, but the IP addresses left alone.
E. SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices.

6.多項(xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()

A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.


7.多項(xiàng)選擇題Which two statements about zoning are correct? ()

A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.

8.多項(xiàng)選擇題Which two characteristics are true of IVRs? ()

A. They are known as fabric routing.
B. They cannot span multiple switches.
C. Their connectivity is supported by Layer 2.
D. They enable devices in different VSAN fabrics to communicate.
E. They require that multiple switch fabrics be merged before they can function.

9.多項(xiàng)選擇題Which two statements about FCIP and iSCSI are correct?()

A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. TheiSCSI stack supports block-level storage for remote devices.
E. The purpose ofiSCSI is to provide connectivity between separate wide-area SANs.

10.多項(xiàng)選擇題In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director()

A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D.allI S Lscontained with inasingle chass is
E.higher latency and through put than acore-edged esign switch

最新試題

In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()

題型:?jiǎn)雾?xiàng)選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:?jiǎn)雾?xiàng)選擇題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:?jiǎn)雾?xiàng)選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項(xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

Which two of these are advantages of placing the VPN device parallel to the firewall?()

題型:多項(xiàng)選擇題

Which of these is true of a Layer 3 out-of-band NAS deployment?()

題型:?jiǎn)雾?xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()

題型:?jiǎn)雾?xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()

題型:?jiǎn)雾?xiàng)選擇題