A. FHRP to remote branches.
B. Layer 3 MPLS VPNs routing.
C. Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
D. Intrusion prevention, QoS, and stateful firewall support network wide.
您可能感興趣的試卷
你可能感興趣的試題
A. Layer 3 MPLS VPNs can forward only IP packets
B. Layer 2 MPLS VPNs can forward any network protocol
C. MPL S label paths are automatically formed based on Layer 2 frames
D. Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E. In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policies
A. device visualization
B. device clustering
C. server visualization
D. network visualization
A. iBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetwork
B. iBGP requires a full mesh of eBGP peers
C. Routers will not advertise iBGP learned routers to other iBGP peers.
D. The use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGP
E. iGBP peers do not add any information to the AS path
A. DPT
B. MPLS
C. VPLS
D. CWDM
E. DWDM
F. SONET/SDH
A. An interface can belong to multiple Flex Links.
B. Flex Links operate only over single pairs of links.
C. Flex Link pairs must be of the same interface type
D. Flex Links automatically disable STP so no BPDUs are propagated
E. Failover from active to standby on Flex Links takes less than a second
A. OSPF stub areas increase the size of the LSDB with the addition of Type 3 and 5 LSAs
B. OSPF not so stubby areas are particularly useful as a simpler form of summarization
C. OSPF stub areas are always insulated from external changes
D. OSPF totally stubby cannot distinguish among ABRs for the best route to destinationsoutsidethe areas
E. OSPF stub areas can distinguish among ASBRs for destinations that are external to the OSPFdomain
A. IDS is capable of both inline and promiscuous monitoring, while IPS is only capable ofpromiscuous monitoring
B. IDS will stop malicious traffic from reaching its intended target for certain types of attacks.
C. IPS processes information on Layer 3 and 4 as well as analyzing the contents and payload ofthe packets for more sophisticated embedded attacks (Layers 3 to 7)
D. IPS inspects traffic statefully and needs to see both sides of the connection to function properly
E. IDS placement at the perimeter of Data Center outside the firewall generates many warningsthat have relatively low value because no action is likely to be taken on this information
最新試題
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Which two statements about Network Attached Storage are correct?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
Which three of the following descriptions are true about the firewall modes? ()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()
Which two of these correctly describe Fibre Channel?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
What are two characteristics of OER? ()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()