A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model
您可能感興趣的試卷
你可能感興趣的試題
A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required
A. fixed broadcast
B. open looped
C. quality equalization
D. VoD delivery
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.
A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address
最新試題
Which statement about data center access layer design modes is correct?()
Which two statements about Network Attached Storage are correct?()
Which two statements about an interface configured with the asr-group command are correct? ()
Which statement about Fibre Channel communications is correct?()
Which two statements about Cisco Security Management Suite are correct? ()
Which three of the following descriptions are true about the firewall modes? ()
Which two of these correctly describe Fibre Channel?()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
In which two locations in an enterprise network can an IPS sensor be placed? ()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()