A. Server-to-server traffic always remains in the core layer.
B. The recommended practice is for the core infrastructure to be in Layer 3.
C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.
E. Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.
您可能感興趣的試卷
你可能感興趣的試題
A. ASM
B. BiDir PIM
C. PIM-SM RP
D. RP-Switchover
E. Source Specific Multicast
A. 0
B. 1
C. 2
D. 4
E. 16
F. infinity
Refer to the exhibit. Which two statements are correct regarding the creation of a multicas tdistribution tree? ()
A. Each router determines where to send the JOIN request.
B. The tree will be built based on the IP address of the E2 interface on router E
C. The best path to the source will be discovered in the unicast routing table on router B
D. The best path to the source will be discovered in the unicast routing table on router C
E. The best path to the source will be discovered in the unicast routing table on router E
A. a single host
B. a subset of hosts
C. all hosts sequentially
D. all hosts simultaneously
A. TCP 502
B. TCP 514
C. TCP 520
D. UDP 502
E. UDP 514
F. UDP 520
最新試題
Which statement correctly describes a situation in which VRFs are used in the data center?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
Which two of these correctly describe Fibre Channel?()
Which statement about data center access layer design modes is correct?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Which two statements about Network Attached Storage are correct?()
Which two statements about FCIP and iSCSI are correct?()
Which two statements about zoning are correct?()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()