A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers
您可能感興趣的試卷
你可能感興趣的試題
A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network
A. Employ path MTU discovery.
B. Set the MTU higher than 1500 bytes.
C. Turn off pre-fragmentation for IPSec.
D. Set the MTU value to 1400 bytes.
A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio
Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()
A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization
A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.
最新試題
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
What is the recommended radius of a cell for a voice-ready wireless network?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()