A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches
C. Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information
您可能感興趣的試卷
你可能感興趣的試題
A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address
A. OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
B. IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
C. QoS requirements with MPLS-VPN must be implemented by the service provider
D. Hierarchical VPLS designs are the least scalable
E. IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required
A. FHRP to remote branches.
B. Layer 3 MPLS VPNs routing.
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
最新試題
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
Which two of these correctly describe asymmetric routing and firewalls? ()
What is the traditional mode for a firewall?()
Which statement about data center access layer design modes is correct?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which statement about Fibre Channel communications is correct?()
Which two statements about FCIP and iSCSI are correct?()
Which signal and noise values will result in the best phone communication with an access point?()
What are two characteristics of GSS? ()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()