Which two practices will avoid Cisco Express Forwarding polarization?()
A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.
您可能感興趣的試卷
你可能感興趣的試題
A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall
A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection
A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol
A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
最新試題
In which two locations in an enterprise network can an IPS sensor be placed? ()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
What is the traditional mode for a firewall?()
Which two statements about zoning are correct?()
What are two characteristics of the SLB One-arm mode? ()
Which three of the following descriptions are true about the firewall modes? ()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Which two of these correctly describe asymmetric routing and firewalls? ()
Which statement about Fibre Channel communications is correct?()