單項(xiàng)選擇題When a router has to make a rate transition from LAN to WAN, what type of congestion needs should be considered in the network design?()

A. RX-queue deferred
B. TX-queue deferred
C. RX-queue saturation
D. TX-queue saturation
E. RX-queue starvation
F. TX-queue starvation


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題

Which two practices will avoid Cisco Express Forwarding polarization?()

A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.

2.單項(xiàng)選擇題What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

A. RADIUS or LDAP
B. an internal router running EIGRP
C. Reverse Route Injection and OSPF or RIPv2
D. the VPN appliance to be deployed in line with the firewall

3.多項(xiàng)選擇題Which two of these are advantages of placing the VPN device parallel to the firewall?()

A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection

4.多項(xiàng)選擇題Under which two circumstances should Spanning Tree Protocol be implemented? ()

A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol

5.多項(xiàng)選擇題Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall

6.單項(xiàng)選擇題In which tunnel-less VPN topology do group members register with a key server in order to receivethe security association necessary to communicate with the group?()

A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN

7.單項(xiàng)選擇題In a base e-Commerce module design, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

9.單項(xiàng)選擇題Which of the following is the primary consideration to scale VPNs?()

A. packets per second
B. number of remote sites
C. throughput bandwidth
D. number of tunnels

10.多項(xiàng)選擇題What four functions does Web Cache Communication Protocol (WCCP) incorporate?()

A. load balancing
B. scalability
C. remote management
D. fault tolerance
E. service assurance

最新試題

What are two characteristics of OER? ()

題型:多項(xiàng)選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項(xiàng)選擇題

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()

題型:多項(xiàng)選擇題

Which two statements about Network Attached Storage are correct?()

題型:多項(xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

Which two of these correctly describe asymmetric routing and firewalls? ()

題型:多項(xiàng)選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項(xiàng)選擇題

Which two of these correctly describe Fibre Channel?()

題型:多項(xiàng)選擇題

What is the traditional mode for a firewall?()

題型:單項(xiàng)選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:單項(xiàng)選擇題