A.use ISL encapsulation
B.use 802.1q encapsulation
C.set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D.use VTP server mode to support dynamic propagation of VLAN information across the network
E.set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation
您可能感興趣的試卷
你可能感興趣的試題
A.only the low-order 23 bits of the MAC address are used to map IP addresses
B.only the low-order 24 bits of the MAC address are used to map IP addresses
C.only the high-order 23 bits of the MAC address are used to map IP addresses
D.only the low-order 23 bits of the IP address are used to map MAC addresses
E.the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F.the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.
A.Easy VPN
B.GRE tunneling
C.Virtual Tunnel Interfaces
D.Dynamic Multipoint VPN
E.Group Encrypted Transport VPN
A.to ensure a loop-free topology
B.to protect against user-side loops
C.in order to support business applications
D.because of the risk of lost connectivity without STP
E.for the most deterministic and highly available network topology
A.19 dBm
B.7 dBm
C.10 dBm
D.6 dBm
E.5 dbm to 10 dBm
A.another name for a firewall deployed in routed mode
B.another name for a firewall deployed in transparent mode
C.a separation of multiple firewall security contexts on a single firewall
D.a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E.a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
A.bridging VLANs on two switches
B.bridging two VLANs on one switch
C.between two Layer 2 devices with trunking
D.between two Layer 2 devices without trunking
E.between a Layer 2 device and a Layer 3 device with trunking
A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers
A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network
最新試題
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
What is the recommended practice when considering VPN termination and firewall placement?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()