A. Server-to-server traffic always remains in the core layer.
B. The recommended practice is for the core infrastructure to be in Layer 3.
C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.
E. Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.
您可能感興趣的試卷
你可能感興趣的試題
A. ASM
B. BiDir PIM
C. PIM-SM RP
D. RP-Switchover
E. Source Specific Multicast
A. 0
B. 1
C. 2
D. 4
E. 16
F. infinity
Refer to the exhibit. Which two statements are correct regarding the creation of a multicas tdistribution tree? ()
A. Each router determines where to send the JOIN request.
B. The tree will be built based on the IP address of the E2 interface on router E
C. The best path to the source will be discovered in the unicast routing table on router B
D. The best path to the source will be discovered in the unicast routing table on router C
E. The best path to the source will be discovered in the unicast routing table on router E
A. a single host
B. a subset of hosts
C. all hosts sequentially
D. all hosts simultaneously
A. TCP 502
B. TCP 514
C. TCP 520
D. UDP 502
E. UDP 514
F. UDP 520
A. supports multiple MIBs
B. includes NetFlow, NBAR, and IP SLA software subsystems
C. includes NetFlow, syslog, and IP SLA software subsystems
D. includes a predefined framework for filtering and correlating messages
E. supports two logging processes so output can be sent in standard and ESM format
A. DTP
B. RPR
C. SDH
D. CWDM
E. DWDM
A. Virtual Gateway
B. Real-IP Gateway
C. NAT Gateway
D. IP-IP Gateway
A. use BGP as the CE-PE routing protocol
B. use OSPF as the CE-PE routing protocol
C. use EIGRP as the CE-PE routing protocol
D. use the SP to redistribute routes as external routes for OSPF and EIGRP
E. use route redistribution at each location to ensure external routes are imported into the IGP
A. The NAS acts as a gateway for all Layer 3 traffic.
B. Only the MAC address is used to identify the client device.
C. User traffic remains on the same VLAN for the duration of the connection.
D. After authentication and posture assessment, client traffic no longer passes through the NAS.
最新試題
What is the traditional mode for a firewall?()
Which two statements about an interface configured with the asr-group command are correct? ()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which path selection protocol is used by Fibre Channel fabrics?()
Which statement about Fibre Channel communications is correct?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
What are two characteristics of OER? ()