A.0.1%
B.1%
C.2.5%
D.25%
您可能感興趣的試卷
你可能感興趣的試題
A.use ISL encapsulation
B.use 802.1q encapsulation
C.set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D.use VTP server mode to support dynamic propagation of VLAN information across the network
E.set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation
A.only the low-order 23 bits of the MAC address are used to map IP addresses
B.only the low-order 24 bits of the MAC address are used to map IP addresses
C.only the high-order 23 bits of the MAC address are used to map IP addresses
D.only the low-order 23 bits of the IP address are used to map MAC addresses
E.the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F.the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
A. NBAR examines data in Layers 1 and 4.
B. NBAR examines data in Layers 3 and 4.
C. NetFlow examines data in Layers 3 and 4.
D. NBAR examines data in Layers 2 through 4.
A.Easy VPN
B.GRE tunneling
C.Virtual Tunnel Interfaces
D.Dynamic Multipoint VPN
E.Group Encrypted Transport VPN
A.to ensure a loop-free topology
B.to protect against user-side loops
C.in order to support business applications
D.because of the risk of lost connectivity without STP
E.for the most deterministic and highly available network topology
A.19 dBm
B.7 dBm
C.10 dBm
D.6 dBm
E.5 dbm to 10 dBm
A.another name for a firewall deployed in routed mode
B.another name for a firewall deployed in transparent mode
C.a separation of multiple firewall security contexts on a single firewall
D.a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context
E.a firewall that has multiple contexts, all of which share the same policies (such as NAT and ACLs)
A.bridging VLANs on two switches
B.bridging two VLANs on one switch
C.between two Layer 2 devices with trunking
D.between two Layer 2 devices without trunking
E.between a Layer 2 device and a Layer 3 device with trunking
A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers
最新試題
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
Refer to the exhibit. Which two statements about the topologies shown are correct?()
Which of the following is the primary consideration to scale VPNs?()
As an experienced technician, you are responsible for infrastructure design and global configuration changes. You are asked to deploy a Voice over Wireless LAN for your company. If the cells have the same channel, the separation between them should be:()
Which signal and noise values will result in the best phone communication with an access point?()
What is the recommended radius of a cell for a voice-ready wireless network?()
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()