單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed? ()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three Layer 2 access designs have all of their uplinks in an active state? ()

A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U

2.單項選擇題Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()

A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches 
C. Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information

3.單項選擇題Which of these recommendations is most appropriate for the core layer in the Cisco Campus Architecture?()

A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.

4.單項選擇題There are 3 steps to confirm whether a range of IP address can be summarized. When of thefollowing is used in each of these 3 steps?()

A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address

5.多項選擇題Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()

A. OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
B. IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
C. QoS requirements with MPLS-VPN must be implemented by the service provider
D. Hierarchical VPLS designs are the least scalable
E. IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required

最新試題

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

題型:單項選擇題

Which two statements about FCIP and iSCSI are correct?()

題型:多項選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項選擇題

To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()

題型:單項選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

What is the traditional mode for a firewall?()

題型:單項選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項選擇題

In which two locations in an enterprise network can an IPS sensor be placed? ()

題型:多項選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項選擇題