A. It is not as common as bridge mode
B. The MSFC is not directly connected to the CSM
C. Outbound traffic from servers may need to be directed by PBR or CSNAT to the CSM
D. The SLB is moved to a position where selected inbound and outbound server traffic goesthrough the SLB
E. The CSM statically routes inbound server traffic to the aggregation switch FWSM, then to the connected server subnet
您可能感興趣的試卷
你可能感興趣的試題
A. Layer 2 mode
B. Layer 3 Edge mode
C. Layer 3 Central mode
D. Layer 3 In-Band mode
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?()
A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Transparent mode is often called bump-in-the-wire mode.
D. Transparent mode firewall deployments are used most often in current designs.
E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
A. Layer 2 Edge mode
B. Layer 2 Central mode
C. Layer 2 In-Band mode
D. Layer 3 mode
A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.
A. Virtual Gateway
B. Real-IP Gateway
C. NAT Gateway
D. Central Gateway
最新試題
Which statement about Fibre Channel communications is correct?()
Which statement about data center access layer design modes is correct?()
Which two statements about an interface configured with the asr-group command are correct? ()
In which two locations in an enterprise network can an IPS sensor be placed? ()
Which two statements about Cisco Security Management Suite are correct? ()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which two statements about Network Attached Storage are correct?()
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()
One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()
Which three mechanisms are used to secure management traffic from outside IPS sensors?()