A. Using multiple EIGRP processes
B. Tuning down the EIGRP delay parameter
C. FIGRP stub routing
D. Limiting the number of EIGRP neighbor per device
您可能感興趣的試卷
你可能感興趣的試題
A. It is recommended to place the VPN termination device in line with the Enterprise Edge 1
B. Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
C. VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
D. Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
A. PortFast
B. UplinkFast
C. loop guard
D. root guard
E. BPDU guard
F. BackboneFast
A. Construct a hierarchical network design using EtherChannel between a server and two VDCsfrom the same physical switch
B. Utilize Cisco NSF with SSO to provide intrachassis SSO at Layers 2 to 4
C. Define the Data Center as an OSPF NSSA area, advertising a default route into the DC And summarizing the routes out of the NSSA to the Campus Core
D. Implement network services for the Data Center as a separate services layer usingactive/active model that is more predictable in failure conditions
A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with Layer 2 link
D. to two core switches from redundant distribution switches connected with Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
Refer to the exhibit.
Which recommended practice is applicable?()
A. If no core layer is deployed, the design will be easier to scale
B. A dedicated campus core layer should be deployed for connecting three or more buildings
C. If no core layer is deployed, the distribution switches should not be fully meshed
D. A dedicated campus core layer is not needed for connecting fewer than five buildings
最新試題
Which three of the following descriptions are true about the firewall modes? ()
What are two characteristics of the SLB One-arm mode? ()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
Which two of these correctly describe Fibre Channel?()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which two of these correctly describe asymmetric routing and firewalls? ()
Which path selection protocol is used by Fibre Channel fabrics?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
What are two characteristics of GSS? ()