單項(xiàng)選擇題In base e-Commerce module designs, where should firewall perimeters be placed?()

A.core layer
B.Internet boundary
C.aggregation layer
D.aggregation and core layers
E.access and aggregation layers


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two of these are characteristics of an IDS sensor?()

A.passively listens to network traffic
B.is an active device in the traffic path
C.has a permissive interface that is used to monitor networks
D.traffic arrives on one IDS interface and exits on another
E.has a promiscuous interface that is used to monitor the network

3.單項(xiàng)選擇題Which of these terms refers to call issues that cause variations in timing or time of arrival?()

A.queuing
B.jitter
C.packet loss
D.digitized sampling
E.signal-to-noise ratio ratio

4.多項(xiàng)選擇題

Refer to the exhibit. Which two of these are correct regarding the recommended practice for distribution layer design?()

A.use a redundant link to the core
B.use a Layer 2 link between distribution switches
C.never use a redundant link to the core because of convergence issues
D.use a Layer 3 link between distribution switches with route summarization
E.use a Layer 3 link between distribution switches without route summarization

5.單項(xiàng)選擇題You are the Cisco Network Designer in Cisco.com. Which of these statements is true of clientless end-user devices?()

A. They do not receive unique IP addresses.
B. RADIUS or LDAP is required.
C. They are assigned addresses from the internal DHCP pool.
D. Their traffic appears to originate from the originating host network.