單項選擇題When an Enterprise Campus network designer is addressing the merger of two companies with different IGPs, which of the following is considering a super routing design?()

A. Eliminate the management and support for redistribution by choosing and cutting over to asingle IGP at the time of merger
B. Maintain distinct pockets across a moving boundary of routing protocols, redistributing betweenthem
C. Manipulate the administrative distance of the different IGPs to be equal throughout the network
D. Leave the IGPs independent without redistribution wherever communication between companyentities is not required


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed? ()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers

2.多項選擇題Which three Layer 2 access designs have all of their uplinks in an active state? ()

A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U

3.單項選擇題Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()

A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches 
C. Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information

4.單項選擇題Which of these recommendations is most appropriate for the core layer in the Cisco Campus Architecture?()

A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.

5.單項選擇題There are 3 steps to confirm whether a range of IP address can be summarized. When of thefollowing is used in each of these 3 steps?()

A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address