A. Use default Layer 4 hash in core.
B. Use default Layer 3 hash in distribution.
C. Use default Layer 4 hash in distribution.
D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
您可能感兴趣的试卷
你可能感兴趣的试题
A. inline with a firewall
B. in a DMZ outside the firewall
C. parallel with a firewall
D. in a DMZ behind the firewall
A. bandwidth
B. number of plug-ins per scan
C. total number of network devices
D. number of checks in each posture assessment
Please match the Cisco STP enahancement term to its definition.()
(1) BPDU guard
(2) PortFast
(3) BackboneFast
(4) Loop guard
(5) Root guard
(a) shuts down a port that receives a BPDU when enabled
(b) cuts convergence time by mas-age for indirect failure
(c) prevents the aliernate or root port from being designated in absence of BPDUs
(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state
(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links
A.(a)-(1);(b)-(2);(c)-(4);(d)-(5);(e)-(3)
B.(a)-(4);(b)-(3);(c)-(2);(d)-(5);(e)-(1)
C.(a)-(3);(b)-(2);(c)-(4);(d)-(5);(e)-(1)
D.(a)-(1);(b)-(3);(c)-(4);(d)-(2);(e)-(4)
A. connection speed
B. number of remote sites
C. features to be supported
D. types of devices at the remote site
A.full mesh
B.peer-to-peer
C.partial mesh
D.hub and spoke
Please match the Cisco NAC appliance component to its description.()
(1)Cisco NAS
(2)Cisco NAA
(3)Rule-set Lpdates
(4)Cisco NAM
(a) a centralized management point
(b) an in-band cr out-of-band device for network access control
(c) a Windows-based client which allows network access based on the tasks running
(d) a status crecker for operating systems,antivirus,antispyware,etc.
A.(a)-(4);(b)-(1);(c)-(2);(d)-(3)
B.(a)-(3);(b)-(2);(c)-(4);(d)-(1)
C.(a)-(4);(b)-(3);(c)-(1);(d)-(2)
D.(a)-(2);(b)-(4);(c)-(3);(d)-(1)
Refer to the exhibit. Which two statements about the topologies shown are correct?()
A. Design 1 is a looped triangle design.
B. Design 2 is a looped triangle design.
C. Design 2 achieves quick convergence using RSTP.
D. Both designs supportstateful services at the aggregation layer.
E. Design 2 is the most widely deployed in enterprise data centers.
A.ISL
B.IVR
C.VoQ
D.VSANs
E.Enhanced ISL
A.IVR
B.FSPF
C.FICON
D.SANTap
A. EIGRP can summarize per interface.
B. OSPF router databases remain independent.
C. When they are configured with stubs, EIGRP regularly floods the topology.
D. OSPF topology decisions are made independent of hierarchy or area.
最新试题
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
What is the recommended practice when considering VPN termination and firewall placement?()
During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
During consultation, you find that a customer has only a single asset closet and is looking for a solution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
In which NAS operating mode are ACL filtering and bandwidth throttling only provided during posture assessment?()
Which three of these are important when determining NAS Server scaling? ()
Which of the following is the primary consideration to scale VPNs?()
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()