A. host security
B. perimeter security
C. security monitoring
D. policy management
您可能感興趣的試卷
你可能感興趣的試題
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A. 3
B. 6
C. 7
D. 8
The Cisco IOS SLB feature is a Cisco IOS-based solution that provides server load balancing.
This feature allows you to define a virtual server that represents a cluster of real servers, known asa server farm.
When a client initiates a connection to the virtual server, the IOS SLB load balances theconnection to a chosen real server, depending on the configured load balance algorithm orpredictor.
Which three implementation modes may be used to deploy SLB? ()
A. Router mode
B. One-arm mode
C. Three-arm mode
D. Bridge mode inline
A. 4
B. 6
C. 7
D. 10
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
最新試題
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
Which two statements about zoning are correct?()
Which two statements about an interface configured with the asr-group command are correct? ()
Which statement about data center access layer design modes is correct?()
What are two characteristics of GSS? ()
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Which statement correctly describes a situation in which VRFs are used in the data center?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()