Which routing protocol best fits these requirements?()
- Supported by multiple router vendors
- Requires minimum router CPU and memory resources
- Uses a simple routing metric
- Supports manual or automatic route summarization
A. EIGRP
B. OSPF
C. IS-IS
D. RIPv2
您可能感興趣的試卷
你可能感興趣的試題
A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model
A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required
A. fixed broadcast
B. open looped
C. quality equalization
D. VoD delivery
A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.
A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic.
最新試題
Which two of these correctly describe asymmetric routing and firewalls? ()
At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()
The Cisco NAC Appliance is able to check which three items before allowing network access?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
What are two characteristics of GSS? ()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
Which two statements about Cisco Security Management Suite are correct? ()
Which signal and noise values will result in the best phone communication with an access point?()