A. single site with centralized call processing
B. single site with distributed call processing
C. multisite with centralized call processing
D. multisite with distributed call processing
您可能感興趣的試卷
你可能感興趣的試題
A. QoS must be set to Platinum
B. WMM must be enabled
C. QoS must be set to Gold
D. TSPEC must be disabled
E. Cisco Compatible Extensions must be disabled
A. rate limit voice traffic
B. configure spanning-tree for fast link convergence
C. isolate voice traffic on separate VLANs
D. classify and mark traffic close to the source
DRAG DROP
A. reliability
B. scalability
C. redundancy
D. manageability
A. An IPS should be deployed if the security policy does not support the denial of traffic.
B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.
C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.
D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.
最新試題
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
What is the recommended radius of a cell for a voice-ready wireless network?()
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()
Which of the following is the primary consideration to scale VPNs?()
One of your customers wishes to use the NAS to perform DHCP functions and does not currently have a Layer 3 gateway in its production network. Which gateway mode is appropriate for this customer?()
Which three of these are important when determining NAS Server scaling? ()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
Refer to the exhibit. Which two statements about the topologies shown are correct?()
What is the recommended practice when considering VPN termination and firewall placement?()