多項選擇題Under which two circumstances should Spanning Tree Protocol be implemented? ()

A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall

2.單項選擇題In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()

A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN

3.單項選擇題In a base e-Commerce module design, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

5.單項選擇題Which of the following is the primary consideration to scale VPNs?()

A. packets per second
B. number of remote sites
C. throughput bandwidth
D. number of tunnels

6.多項選擇題What four functions does Web Cache Communication Protocol (WCCP) incorporate?()

A. load balancing
B. scalability
C. remote management
D. fault tolerance
E. service assurance

9.單項選擇題A network vulnerability scanner is part of which critical element of network and system security?()

A. host security
B. perimeter security
C. security monitoring
D. policy management

10.單項選擇題You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module,which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

最新試題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

題型:多項選擇題

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()

題型:多項選擇題

Which path selection protocol is used by Fibre Channel fabrics?()

題型:單項選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:單項選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項選擇題

Which three of the following descriptions are true about the firewall modes? ()

題型:多項選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

Which signal and noise values will result in the best phone communication with an access point?()

題型:單項選擇題