A. Layer 2
B. Layer 3
C. in-band
D. out-of-band
E. edge
F. central
您可能感興趣的試卷
你可能感興趣的試題
A. Thin Model
B. Thick Client
C. Port Forwarding
D. Clientless Access
E. Layer 3 Network Access
A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby RouteProcessors.
A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than onesecond.
E. NSF and SSO with redundant supervisors have the most impact on outages at the accesslayer.
A. have the firewall and VPN appliance deployed in parallel
B. place the VPN in line with the firewall, with the VPN terminating inside the firewall
C. place the public side of the VPN termination device in the DMZ behind a firewall
D. place the VPN in line with the firewall, with the VPN terminating outside the firewall
最新試題
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which two statements about zoning are correct?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
Which statement about Fibre Channel communications is correct?()
Which path selection protocol is used by Fibre Channel fabrics?()
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Which two statements about Network Attached Storage are correct?()
What is the traditional mode for a firewall?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()