A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
您可能感兴趣的试卷
你可能感兴趣的试题
A.4
B.6
C.-67
D.10
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of the larger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved, even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.
A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.
Which two characteristics are true of a firewall running in routed mode based on the following information?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.
A. dial plans
B. dialed numbers
C. voice mail prompts
D. phone features
A. OSPF is not supported by the design
B. HSRP is not supported by the design
C. preempt tuning of the default gateway is needed
D. the design implements Layer 3 between the access switch and the distribution switch
A. close to the servers
B. close to the end users
C. at the Internet edge
D. in front of web server farms
A. termination devices need routable addresses inside the VPN
B. termination devices need not routable addresses inside the VPN
C. IGP routing protocols will update their routing tables over anIPsec VPN
D. addressing designs need to allow for summarization
最新试题
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
Which of the following is the primary consideration to scale VPNs?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
What is the recommended practice when considering VPN termination and firewall placement?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
Which of these is true of a Layer 3 out-of-band NAS deployment?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()