A. high scalability
B. the design supports a layered security model
C. firewall addressing does not need to change
D. IPsec decrypted traffic is inspected by the firewall
E. there is a centralized point for logging and content inspection
您可能感興趣的試卷
你可能感興趣的試題
A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol
A. fewer devices to manage
B. moderate-to-high scalability
C. stateful inspection of decrypted VPN traffic
D. increased bandwidth with additional interfaces
E. decreased complexity as traffic is filtered from the firewall
A. Easy VPN
B. GRE tunneling
C. Virtual Tunnel Interfaces
D. Dynamic Multipoint VPN
E. Group Encrypted Transport VPN
A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.
A. single run
B. multi-homed
C. stub domain EBGP
D. direct BGP peering
最新試題
What are two characteristics of OER? ()
Which two of these correctly describe Fibre Channel?()
Which two statements about FCIP and iSCSI are correct?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which two of these correctly describe asymmetric routing and firewalls? ()
Which three of the following descriptions are true about the firewall modes? ()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Which two statements about Network Attached Storage are correct?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which statement correctly describes a situation in which VRFs are used in the data center?()