Refer to the exhibit. When deploying an MSFC and an FWSM, which statement is correct?()
A. Proper placement depends on the VLAN assignment.
B. Place it outside the firewall.
C. Place it inside the firewall to make design and management easier.
D. Place it inside the firewall with multiple context modes connecting to all configured contexts.
您可能感興趣的試卷
你可能感興趣的試題
A.DiffServ
B.IntServ
C.RSVP
D.WFQ
A. 3600 series
B. 7200 series with NSE-1
C. 7500 series
D. 12000 series
A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
Which routing protocol best fits these requirements?()
- Supported by multiple router vendors
- Requires minimum router CPU and memory resources
- Uses a simple routing metric
- Supports manual or automatic route summarization
A.EIGRP
B.OSPF
C.IS-IS
D.RIPv2
DRAG DROP
DRAG DROP
A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model
A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required
A. optical technology for transmitting up to 32 channels over multiple fiber strands
B. optical technology for transmitting up to 16 channels over multiple fiber strands
C. a WDM system that is compatible with EDFA technology
D. a technology for transmitting more closely packed optical signals using more sophisticated transceiver designs than CWDM .
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
最新試題
Which two of these are advantages of placing the VPN device parallel to the firewall?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which signal and noise values will result in the best phone communication with an access point?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
What is the recommended practice when considering VPN termination and firewall placement?()
Which three of these are important when determining NAS Server scaling? ()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()