A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
您可能感興趣的試卷
你可能感興趣的試題
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
A. OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
B. IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
C. QoS requirements with MPLS-VPN must be implemented by the service provider
D. Hierarchical VPLS designs are the least scalable
E. IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required
A. FHRP to remote branches.
B. Layer 3 MPLS VPNs routing.
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
A. device visualization
B. device clustering
C. server visualization
D. network visualization
最新試題
Which two statements about an interface configured with the asr-group command are correct? ()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
Which two of these correctly describe asymmetric routing and firewalls? ()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
What are two characteristics of the SLB One-arm mode? ()
Which statement about data center access layer design modes is correct?()