單項(xiàng)選擇題When an Enterprise Campus network designer is addressing the merger of two companies with different IGPs, which of the following is considering a super routing design?()

A. Eliminate the management and support for redistribution by choosing and cutting over to asingle IGP at the time of merger
B. Maintain distinct pockets across a moving boundary of routing protocols, redistributing betweenthem
C. Manipulate the administrative distance of the different IGPs to be equal throughout the network
D. Leave the IGPs independent without redistribution wherever communication between companyentities is not required


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題In base e-Commerce module designs, where should firewall perimeters be placed? ()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers

2.多項(xiàng)選擇題Which three Layer 2 access designs have all of their uplinks in an active state? ()

A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U

3.單項(xiàng)選擇題Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()

A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches 
C. Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information

4.單項(xiàng)選擇題Which of these recommendations is most appropriate for the core layer in the Cisco Campus Architecture?()

A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.

5.單項(xiàng)選擇題There are 3 steps to confirm whether a range of IP address can be summarized. When of thefollowing is used in each of these 3 steps?()

A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address

最新試題

Which two statements about zoning are correct?()

題型:多項(xiàng)選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項(xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Which statement correctly describes a situation in which VRFs are used in the data center?()

題型:?jiǎn)雾?xiàng)選擇題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項(xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項(xiàng)選擇題

In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()

題型:多項(xiàng)選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:?jiǎn)雾?xiàng)選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項(xiàng)選擇題

To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()

題型:?jiǎn)雾?xiàng)選擇題