單項(xiàng)選擇題Which statement correctly describes a situation in which VRFs are used in the data center?()

A. Partitioning of network resources is enabled.
B. VRFs cannot support path isolation from MAN/WAN designs.
C. VRFs cannot be used to map a virtualized data center to a MPLS implementation.
D. VRFs do not allow for the use of application services with multiple access topologies.
E. An access design using a VRF allows for an aggregation layer service module solution.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()

A. Troubleshooting is more complicated.
B. Service and switch modules are underutilized.
C. Layer 2 adjacency is required with the servers that use this design.
D. Layer 3 adjacency is required with the servers that use this design.
E. Load balancing will always occur across both access layer uplinks.

2.多項(xiàng)選擇題Which two design recommendations are most appropriate when EIGRP is the data center core routing protocol?()

A. Summarize data center subnets.
B. Use passive interfaces to ensure appropriate adjacencies.
C. Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.
D. Adjust the default bandwidth value to ensure proper bandwidth on all links.
E. Advertise a default summary route into the data center core from the aggregation layer.

3.多項(xiàng)選擇題Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

A. Never use passive interfaces.
B. Use NSSA areas from the core down.
C. Use totally stub areas to stop type 3 LSAs.
D. Use the lowest Ethernet interface IP address as the router ID.
E. Tune OSPF timers to enable OSPF to achieve quicker convergence.

4.單項(xiàng)選擇題Which of the following is a characteristic of a data center core?()

A. Server-to-server traffic always remains in the core layer.
B. The recommended practice is for the core infrastructure to be in Layer 3.
C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port.
E. Core layer should run BGP along with an IGP becauseiBGP has a lower administrative distance than any IGP.

5.多項(xiàng)選擇題Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A.ASM
B.BiDirPIM
C.PIM-SMRP
D.RP-Switchover
E.SourceSpecificMulticast

最新試題

Refer to the exhibit. Which two statements about the topologies shown are correct?()

題型:多項(xiàng)選擇題

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

題型:單項(xiàng)選擇題

Which of the following is the primary consideration to scale VPNs?()

題型:單項(xiàng)選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項(xiàng)選擇題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:單項(xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:單項(xiàng)選擇題

What amount of cell overlap ensures smooth roaming for wireless endpoints?()

題型:單項(xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()

題型:單項(xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項(xiàng)選擇題