A.IPSec VPN
B.SSL VPN
C.port security
D.port security with statically configured MAC addresses
E.private VLANs
您可能感興趣的試卷
你可能感興趣的試題
A.root guard
B.loop guard
C.BPDU guard
D.UDLD
E.BPDU skew detection
A.a routing protocol that is flooding updates
B.a flapping port that is generating BPDUs with the TCN bit set
C.STP is not running on the switch
D.a user that is downloading the output of the show-tech command
E.a corrupted switch CAM table
A.ip verify unicast source reachable-via any
B.ip verify unicast reverse-path
C.ip verify unicast reverse-path loose
D.ip verify unicast reverse-path strict
A.Increase the queue size of the voice class.
B.Guarantee bandwidth during congestion to the voice class with a bandwidth command.
C.Increase the tx-ring of the egress interface.
D.Implement LLQ for the voice class.
E.Decrease the rx-ring of the egress interface.
F.Decrease the queue size of the voice class.
A.It will advertise the prefix to all other client peers and non-client peers.
B.It will not advertise the prefix to EBGP peers.
C.It will only advertise the prefix to all other IBGP peers.
D.It will not advertise the prefix to any peers.
最新試題
When two bridges are competing for the root bridge of an IEEE 802.1D spanning tree and both have the same bridge priority configured, which parameter determines the winner?()
Which QoS mechanism can help classify different kinds of Citrix traffic (print job versus real-time terminal control)?()
An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()
Phase I and Phase II DMVPN differ in terms of which of these characteristics?()
Which three statements are true about policing? ()
What does the OSPF command capability vrf-lite achieve?()
Which three protocols should be explicitly managed by using Control Plane Policing on an Internet border router?()
For the following ports, which port is on every bridge in a Spanning Tree Protocol IEEE 802.1w network except the root bridge?()
What are the "bound IP addresses" used for in LDP?()
For the following items,what is the mathematical relationship between the committed information rate (CIR), committed burst (Bc), and committed rate measurement interval (Tc)?()