A. Dynamic Trunking Protocol
B. Resilient Packet Ring
C. Synchronous Digital Hierarchy
D. Coarse Wave Division Multiplexing
您可能感興趣的試卷
你可能感興趣的試題
A. availability
B. performance
C. functionality
D. manageability
A. Use default Layer 4 hash in core.
B. Use default Layer 3 hash in distribution.
C. Use default Layer 4 hash in distribution.
D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
A. A firewall in routed mode has one IP address
B. A firewall in transparent mode has one IP address
C. In routed mode, the firewall is considered to be a Layer 2 dew
D. In routed mode, the firewall is considered to be a Layer 3 device
E. In transparent mode, the firewall is considered to be a Layer 2 device
F. In transparent mode, the firewall is considered to be a Layer 3 device
Refer to the exhibit.
Which of the following is an advantage of device clustering utilizing Virtual Port Channels (vPC)?()
A. A logical star topology provides a loop free environment so that all links will be used forwardtraffic
B. Enhanced EtherChannel hashing load balancing using the vPC peer link internal to the VPC
C. The control plane functions of the Nexus switches are merged to hide the use of virtualization
D. Neighboring devices connect on a Layer 3 MEC for improved packet forwarding
A. It supports multipath routing
B. It can run any type of storage ports
C. When it is used, hop-by-hop routes are based only on the switch ID
D. When it is used, path status is based on the functionality of attached ports
E. It runs only on a switch fabric and cannot function in a VSAN
最新試題
What are two characteristics of the SLB One-arm mode? ()
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()
What are two characteristics of GSS? ()
During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which path selection protocol is used by Fibre Channel fabrics?()
Which three of the following descriptions are true about the firewall modes? ()
Which two of these correctly describe asymmetric routing and firewalls? ()
To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()
At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()