A.CST
B.MST
C.STP
D.PVST+
E.RPVST+
您可能感興趣的試卷
你可能感興趣的試題
A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol
Refer to the exhibit. Which recommended practice is applicable?()
A. If no core layer is deployed, the design will be easier to scale.
B. If no core layer is deployed, there will be fewer cabling requirements.
C. If no core layer is deployed, the distribution switches should not be fully meshed.
D. A dedicated campus core layer is not needed for connecting fewer than five buildings.
E. A dedicated campus core layer should be deployed for connecting three or more buildings.
A. Utilize Layer 3 switching.
B. Utilize software accelerated services.
C. Aggregate end users and support a feature-rich environment.
D. Perform packet manipulation and filtering at the core layer.
E. Use redundant point-to-point Layer 2 interconnections when there is a link or node failure.
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
最新試題
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
Which technology allows centralized storage services to be shared across different VSANs?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
Which of the following is the primary consideration to scale VPNs?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()
What is the recommended practice when considering VPN termination and firewall placement?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()