A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
您可能感興趣的試卷
你可能感興趣的試題
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
A. An interface can only belong to single Flex Links.
B. An interface can belong to multiple Flex Links.
C. Flex Links operate only over single pairs of links.
D. Flex Links automatically disable STP so no BPDUs are propagated.
A. load balancing
B. scalability
C. remote management
D. fault tolerance
E. service assurance
A.IVR
B.FSPF
C.FICON
D.SANTap
A. up to 10Gbps of bandwidth at the access level
B. redundant servers at the access level
C. modular block design at the access level
D. high port densities at the access level
最新試題
Which signal and noise values will result in the best phone communication with an access point?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
What is the recommended practice when considering VPN termination and firewall placement?()