A. Server-to-server traffic always remains in the core layer.
B. The recommended practice is for the core infrastructure to be in Layer 3.
C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port.
E. Core layer should run BGP along with an IGP becauseiBGP has a lower administrative distance than any IGP.
您可能感興趣的試卷
你可能感興趣的試題
A.ASM
B.BiDirPIM
C.PIM-SMRP
D.RP-Switchover
E.SourceSpecificMulticast
A. 0
B. 1
C. 2
D. 4
E. 16
F. infinity
A. a single host
B. a subset of hosts
C. all hosts sequentially
D. all hosts simultaneously
A.TCP502
B.TCP514
C.TCP520
D.UDP502
E.UDP514
F.UDP520
A. supports multiple MIBs
B. includesNetFlow, NBAR, and IP SLA software subsystems
C. includesNetFlow, syslog, and IP SLA software subsystems
D. includes a predefined framework for filtering and correlating messages
E. supports two logging processes so output can be sent in standard and ESM format
A. to provide service internetworking
B. to support transparency for Layer 2 frames
C. as a connection identifier to indicate destination
D. as a mapping to the DLCI in service internetworking
E. to provide a trunk by which all VLANs can navigate from one site to one or multiple sites
A. use BGP as the CE-PE routing protocol
B. use OSPF as the CE-PE routing protocol
C. use EIGRP as the CE-PE routing protocol
D. use the SP to redistribute routes as external routes for OSPF and EIGRP
E. use route redistribution at each location to ensure external routes are imported into the IGP
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPLS label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
A.DPT
B.MPLS
C.VPLS
D.CWDM
E. DWDM
F. SONET/SDH
A. class of service
B. bandwidth profiles
C. user-network interface
D. Ethernet LAN circuit attributes
E. Ethernet virtual circuit attributes
最新試題
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()