單項(xiàng)選擇題Which of these technologies is characterized as being a multipoint Layer 2 VPN that connects twoor more customer devices using Ethernet bridging techniques?()

A. DPT
B. MPLS
C. VPLS
D. CWDM
E. DWDM
F. SONET/SDH


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two statements are correct regarding Flex Links? ()

A. An interface can belong to multiple Flex Links.
B. Flex Links operate only over single pairs of links.
C. Flex Link pairs must be of the same interface type
D. Flex Links automatically disable STP so no BPDUs are propagated
E. Failover from active to standby on Flex Links takes less than a second

2.多項(xiàng)選擇題OSPF stub areas are an important tool for the Network designer; which of the following two shouldbe considered when utilizing OSPF stub areas? ()

A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B. OSPF not so stubby areas are particularly useful as a simpler form of summarization
C. OSPF stub areas are always insulated from external changes
D. OSPF totally stubby cannot distinguish among ABRs for the best route to destinationsoutsidethe areas
E. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPFdomain

3.多項(xiàng)選擇題As a critical part of the design for the Enterprise Campus network, which of the following two aretrue concerning intrusion detection and prevention solution? ()

A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information

最新試題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項(xiàng)選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about FCIP and iSCSI are correct?()

題型:多項(xiàng)選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:?jiǎn)雾?xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項(xiàng)選擇題

What are two characteristics of OER? ()

題型:多項(xiàng)選擇題

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()

題型:多項(xiàng)選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項(xiàng)選擇題