Which two practices will avoid Cisco Express Forwarding polarization?()
A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.
您可能感興趣的試卷
你可能感興趣的試題
A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
E. At least 33 percent of the link bandwidth should be reserved for default best-effort class.
A.CST
B.MST
C.STP
D.PVST+
E.RPVST+
A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol
Refer to the exhibit. Which recommended practice is applicable?()
A. If no core layer is deployed, the design will be easier to scale.
B. If no core layer is deployed, there will be fewer cabling requirements.
C. If no core layer is deployed, the distribution switches should not be fully meshed.
D. A dedicated campus core layer is not needed for connecting fewer than five buildings.
E. A dedicated campus core layer should be deployed for connecting three or more buildings.
A. Utilize Layer 3 switching.
B. Utilize software accelerated services.
C. Aggregate end users and support a feature-rich environment.
D. Perform packet manipulation and filtering at the core layer.
E. Use redundant point-to-point Layer 2 interconnections when there is a link or node failure.
最新試題
Which of the following is the primary consideration to scale VPNs?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()
Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.
What is the recommended radius of a cell for a voice-ready wireless network?()
In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()