A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
您可能感興趣的試卷
你可能感興趣的試題
A. routed mode
B. context mode
C. bridged mode
D. transparent mode
E. full security mode
A. It helps verify end-to-end path availability.
B. It provides traffic rerouting in case of disaster.
C. HSRP, GLBP, and VRRP can be clients of GSS.
D. BGP must be the routing protocol between the distributed data centers.
E. DNS responsiveness is improved by providing centralized domain management.
A. It can take on HSRP, VRRP, and GLBP as clients.
B. It provides automatic inbound route optimization.
C. Path selection may be based on delay, loss, or jitter.
D. The border router makes decisions about which outbound path to use.
E. Automatic load distribution is provided for multiple connections.
A. It is not as common as bridge mode
B. The MSFC is not directly connected to the CSM
C. Outbound traffic from servers may need to be directed by PBR or CSNAT to the CSM
D. The SLB is moved to a position where selected inbound and outbound server traffic goesthrough the SLB
E. The CSM statically routes inbound server traffic to the aggregation switch FWSM, then to the connected server subnet
A. Layer 2 mode
B. Layer 3 Edge mode
C. Layer 3 Central mode
D. Layer 3 In-Band mode
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
A. Layer 2 Edge mode
B. Layer 2 Central mode
C. Layer 2 In-Band mode
D. Layer 3 mode
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
A. Virtual Gateway
B. Real-IP Gateway
C. NAT Gateway
D. Central Gateway
A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. The iSCSI stack supports block-level storage for remote devices.
E. The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
最新試題
What are two characteristics of the SLB One-arm mode? ()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
Which statement correctly describes a situation in which VRFs are used in the data center?()
Which statement about data center access layer design modes is correct?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
During consultation, you find that a customer has multiple asset closets and will be adding more inthe future. Which NAS physical deployment model would you suggest to this customer?()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
Which two of these correctly describe Fibre Channel?()
Which signal and noise values will result in the best phone communication with an access point?()