A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
您可能感興趣的試卷
你可能感興趣的試題
A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.
A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than onesecond.
E. NSF and SSO with redundant supervisors have the most impact on outages at the accesslayer.
A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall
A. RX-queue deferred
B. TX-queue deferred
C. RX-queue saturation
D. TX-queue saturation
E. RX-queue starvation
F. TX-queue starvation
Which two practices will avoid Cisco Express Forwarding polarization?()
A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.
最新試題
During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which statement about Fibre Channel communications is correct?()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
In which two locations in an enterprise network can an IPS sensor be placed? ()