A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model
您可能感興趣的試卷
你可能感興趣的試題
A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required
A. optical technology for transmitting up to 32 channels over multiple fiber strands
B. optical technology for transmitting up to 16 channels over multiple fiber strands
C. a WDM system that is compatible with EDFA technology
D. a technology for transmitting more closely packed optical signals using more sophisticated transceiver designs than CWDM .
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
最新試題
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links
Which two of these are advantages of placing the VPN device parallel to the firewall?()