A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
您可能感興趣的試卷
你可能感興趣的試題
A. routed mode
B. context mode
C. bridged mode
D. transparent mode
E. full security mode
A. It helps verify end-to-end path availability.
B. It provides traffic rerouting in case of disaster.
C. HSRP, GLBP, and VRRP can be clients of GSS.
D. BGP must be the routing protocol between the distributed data centers.
E. DNS responsiveness is improved by providing centralized domain management.
A. It can take on HSRP, VRRP, and GLBP as clients.
B. It provides automatic inbound route optimization.
C. Path selection may be based on delay, loss, or jitter.
D. The border router makes decisions about which outbound path to use.
E. Automatic load distribution is provided for multiple connections.
A. It is not as common as bridge mode
B. The MSFC is not directly connected to the CSM
C. Outbound traffic from servers may need to be directed by PBR or CSNAT to the CSM
D. The SLB is moved to a position where selected inbound and outbound server traffic goesthrough the SLB
E. The CSM statically routes inbound server traffic to the aggregation switch FWSM, then to the connected server subnet
A. Layer 2 mode
B. Layer 3 Edge mode
C. Layer 3 Central mode
D. Layer 3 In-Band mode
最新試題
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
Which path selection protocol is used by Fibre Channel fabrics?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
What are two characteristics of the SLB One-arm mode? ()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()