單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed? ()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which three Layer 2 access designs have all of their uplinks in an active state? ()

A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U

2.單項選擇題Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()

A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches 
C. Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information

3.單項選擇題Which of these recommendations is most appropriate for the core layer in the Cisco Campus Architecture?()

A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.

4.單項選擇題There are 3 steps to confirm whether a range of IP address can be summarized. When of thefollowing is used in each of these 3 steps?()

A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address

5.多項選擇題Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()

A. OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
B. IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
C. QoS requirements with MPLS-VPN must be implemented by the service provider
D. Hierarchical VPLS designs are the least scalable
E. IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required