A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol
您可能感興趣的試卷
你可能感興趣的試題
A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
A. packets per second
B. number of remote sites
C. throughput bandwidth
D. number of tunnels
最新試題
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which two statements about an interface configured with the asr-group command are correct? ()
What are two characteristics of GSS? ()
Which two of these correctly describe asymmetric routing and firewalls? ()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
Which two statements about FCIP and iSCSI are correct?()
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
Which statement correctly describes a situation in which VRFs are used in the data center?()