A.full mesh
B.peer-to-peer
C.partial mesh
D.hub and spoke
您可能感興趣的試卷
你可能感興趣的試題
Please match the Cisco NAC appliance component to its description.()
(1)Cisco NAS
(2)Cisco NAA
(3)Rule-set Lpdates
(4)Cisco NAM
(a) a centralized management point
(b) an in-band cr out-of-band device for network access control
(c) a Windows-based client which allows network access based on the tasks running
(d) a status crecker for operating systems,antivirus,antispyware,etc.
A.(a)-(4);(b)-(1);(c)-(2);(d)-(3)
B.(a)-(3);(b)-(2);(c)-(4);(d)-(1)
C.(a)-(4);(b)-(3);(c)-(1);(d)-(2)
D.(a)-(2);(b)-(4);(c)-(3);(d)-(1)
Refer to the exhibit. Which two statements about the topologies shown are correct?()
A. Design 1 is a looped triangle design.
B. Design 2 is a looped triangle design.
C. Design 2 achieves quick convergence using RSTP.
D. Both designs supportstateful services at the aggregation layer.
E. Design 2 is the most widely deployed in enterprise data centers.
A.ISL
B.IVR
C.VoQ
D.VSANs
E.Enhanced ISL
A.IVR
B.FSPF
C.FICON
D.SANTap
A. EIGRP can summarize per interface.
B. OSPF router databases remain independent.
C. When they are configured with stubs, EIGRP regularly floods the topology.
D. OSPF topology decisions are made independent of hierarchy or area.
A. packets per second
B. number of remote sites
C. throughput bandwidth
D. number of tunnels
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. DynamicMultipoint VPN
E. Group Encrypted Transport VPN
A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall
A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection
A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall
最新試題
Which technology allows centralized storage services to be shared across different VSANs?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
Which of the following is the primary consideration to scale VPNs?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()