A. The access layer is the first oversubscription point in a data center design.
B. When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
C. When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
D. When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.
E. The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.
第1题:
Which statement about the S-Series native FTP proxy is not true?()
第2题:
When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()
第3题:
Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()
第4题:
Which three statements about firewall modes are correct? ()
第5题:
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()
第6题:
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()
第7题:
Which statement correctly describes a situation in which VRFs are used in the data center?()
第8题:
Which statement is TRUE about the CacheFactory class ?()
第9题:
it is a topology agnostic way to access NamedCaches
it provides mechanisms to manage underlying remote data sources
both A and B are TRUE
Neither A nor B are TRUE
第10题:
LWAPP encrypts control traffic between the AP and the controller.
LWAPP encrypts user traffic with a x.509 certificate using AES-CCMP
LWAPP encrypts both control traffic and user data.
When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.
第11题:
both active and passive modes FTP are supported
by default the FTP proxy uses port 8021
access polices may apply to native FTP traffic
data loss prevention policies may apply to native FTP traffic
authentication is supported in transparent mode
第12题:
The access layer is the first oversubscription point in a data center design.
When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.
第13题:
Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()
第14题:
Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()
第15题:
In the three-layer hierarchical network design model;what’s associated with the access layer?()
第16题:
Which statement is true about the data traffic between the access point named TKAP1 and controller TKC1?()
第17题:
Which statement about data center access layer design modes is correct?()
第18题:
In a base e-Commerce module design, which routing statement is correct?()
第19题:
Which statement about access lists that are applied to an interface is true?()
第20题:
A firewall in routed mode has one IP address
A firewall in transparent mode has one IP address
In routed mode, the firewall is considered to be a Layer 2 dew
In routed mode, the firewall is considered to be a Layer 3 device
In transparent mode, the firewall is considered to be a Layer 2 device
In transparent mode, the firewall is considered to be a Layer 3 device
第21题:
you can apply multiple access lists with the same protocol or in different…
you can config one access list,per direction,per layer 3 protocol
you can placeasmanyaccess lists as you want on any interface
you can apply ony one access list on any interface
第22题:
you can apply multiple access lists with the same protocol or in different direction.
you can config one access list,per direction,per layer 3 protocol
you can place as many access lists as you want on any interface
you can apply only one access list on any interface
第23题:
Routing is mostly static.
Hardcoded IP addresses are used to support failover.
Inbound servers use the CSM or ACE as the default gateway.
VLANs between the access layer switches are used for FHRP protocols.
第24题:
The data traffic between the access point and controller is not encrypted.
The data traffic is encapsulated with LWAPP.
The data traffic is switched at the access point before being sent to the WLAN controller where VLAN tagging and QoS are applied.
The data traffic is encrypted with AES.
All of the above