多項(xiàng)選擇題Which three Layer 2 access designs have all of their uplinks in an active state?()

A.Flex Links
B.loop-free U
C.looped square
D.looped triangle
E.loop-free inverted U


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題When BGP tuning is used, how is packet flow into the e-commerce module controlled?()

A.by tracking the status of objects along the path to the e-commerce module
B.by detecting undesirable conditions along the path to the e-commerce module
C.by using the MED to communicate the site preferences for traffic to multiple ISPs
D.by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E.by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

2.單項(xiàng)選擇題What is meant by the term "firewall sandwich"?()

A.multiple layers of firewalling
B.a method of operating firewalls from multiple vendors
C.firewall connections in either an active or standby state
D.an architecture in which all traffic between firewalls goes through application-specific servers
E.an architecture in which all traffic between firewalls goes through application-specific gateways

3.單項(xiàng)選擇題Which statement is correct regarding NBAR and NetFlow?()

A.NetFlow uses five key fields for the flow
B.NBAR examines data in Layers 3 and 4
C.NetFlow examines data in Layers 3 and 4
D.NBAR examines data in Layers 2 through 4
E.NetFlow examines data in Layers 2 through 4

4.單項(xiàng)選擇題When BGP tuning is used, how is packet flow into the e-commerce module controlled?()

A. by tracking the status of objects along the path to the e-commerce module
B. by detecting undesirable conditions along the path to the e-commerce module
C. by using the MED to communicate the site preferences for traffic to multiple ISPs
D. by communicating the available prefixes, routing policies, and preferences of each site to its ISP
E. by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

5.單項(xiàng)選擇題Which of these statements is true of clientless end-user devices?()

A.They do not receive unique IP addresses
B.RADIUS or LDAP is required in order to assign IP addresses
C.They are assigned addresses from the internal DHCP pool
D.Their traffic appears to originate from the originating host network