A. no congestion avoidance
B. not for bandwidth intensive applications
C. no guaranteed delivery mechanism
D. source sends multiple data streams out each interface
您可能感興趣的試卷
你可能感興趣的試題
A.4
B.6
C.-67
D.10
A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of the larger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved, even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.
A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.
A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.
Which two characteristics are true of a firewall running in routed mode based on the following information?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.
最新試題
Which technology allows centralized storage services to be shared across different VSANs?()
As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
What is the recommended practice when considering VPN termination and firewall placement?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()