A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers
您可能感興趣的試卷
你可能感興趣的試題
A. Implement highly redundant switching and links with no single points or paths of failure.
B. Implement server load balancing.
C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D. Implement intrusion detection with automatic notification of intrusion attempts in place.
A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network
A. IP telephony
B. security
C. IP multicasting
D. QoS
A.echo
B.jitter
C.packet loss
D.digitized sampling
A. dynamic reconfiguration
B. path MTU discovery
C. auto setup
D. remote management
最新試題
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Which of the following is the primary consideration to scale VPNs?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
Which technology allows centralized storage services to be shared across different VSANs?()
Which three of these are important when determining NAS Server scaling? ()