A. Easy VPN B. GRE tunneling C. Virtual Tunnel Interfaces D. DynamicMultipoint VPN E. Group Encrypted Transport VPN
A. It uses SNMP v1. B. It scans devices for hardware information. C. It scans and records the operational status of devices. D. When the configuration of a device changes, the inventory is automatically updated.
A. prioritization B. classification C. fragmentation D. traffic shaping
A.IVR B.FSPF C.FICON D.SANTap
A. core layer B. Internet boundary C. aggregation layer D. aggregation and core layers E. access and aggregation layers