A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with Layer 2 link
D. to two core switches from redundant distribution switches connected with Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
您可能感興趣的試卷
你可能感興趣的試題
Refer to the exhibit.
Which recommended practice is applicable?()
A. If no core layer is deployed, the design will be easier to scale
B. A dedicated campus core layer should be deployed for connecting three or more buildings
C. If no core layer is deployed, the distribution switches should not be fully meshed
D. A dedicated campus core layer is not needed for connecting fewer than five buildings
A. GRE
B. 802 1Q
C. MPLS
D. L2TPv3
A. It will only become active after a software failure
B. It will only become active after a hardware failure
C. It requires that Cisco N3F· be enabled in order to work successfully
D. It synchronizes the MAC·, FIB·, and adjacency tables between Active and Standby Route Processors
A. They are known as fabric routing
B. They cannot span multiple switches
C. Their connectivity is supported by Layer 2
D. They enable devices in different VSAN fabrics to communicate
E. They require that multiple switch fabrics be merged before they can function
A. a WDM system that is compatible with EDFA technology
B. an optical technology for transmitting up to 16 channels over multiple fiber strands
C. an optical technology for transmitting up to 32 channels over multiple fiber strands
D. a technology for transmitting multiple optical signals using less sophisticated transceiver designthen CWDM
E. a technology for transmitting more closely packed optical signals using more sophisticatedtransceiver designs than CWDM
最新試題
Which two statements about Cisco Security Management Suite are correct? ()
What are two characteristics of GSS? ()
What are two characteristics of the SLB One-arm mode? ()
Which two statements about zoning are correct?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which two of these correctly describe asymmetric routing and firewalls? ()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()