A. only operational in routed mode
B. only operational in transparent mode
C. only eight interfaces can belong to an asymmetric routing group
D. operational in both failover and non-failover configurations
E. only operational when the firewall has been configured for failover
您可能感興趣的試卷
你可能感興趣的試題
A. The FWSM supports up to 16 asymmetric routing groups.
B. If a matching packet is not found, the packet is dropped.
C. Asymetric routing of return traffic is enabled.
D. If a matching packet is found, the Layer 3 header is rewritten.
E. If a matching packet is found, the Layer 3 header is rewritten and the packet is forwarded to the default gateway.
A. Transparent mode is layer 2.
B. Routed mode is layer 3.
C. Routed mode has 1 IP address.
D. Transparent mode has 1 IP address.
A.routed mode
B.context mode
C.bridged mode
D.transparent mode
E.full security mode
A. It helps verify end-to-end path availability.
B. It provides traffic rerouting in case of disaster.
C. HSRP, GLBP, and VRRP can be clients of GSS.
D. BGP must be the routing protocol between the distributed data centers.
E. DNS responsiveness is improved by providing centralized domain management.
A. It can take on HSRP, VRRP, and GLBP as clients.
B. It provides automatic inbound route optimization.
C. Path selection may be based on delay, loss, or jitter.
D. The border router makes decisions about which outbound path to use.
E. Automatic load distribution is provided for multiple connections.
最新試題
An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()
How many channels are defined in the IEEE 802.11b DSSS channel set?()
Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()
Which three of these are important when determining NAS Server scaling? ()
What is the recommended radius of a cell for a voice-ready wireless network?()
Which of the following is the primary consideration to scale VPNs?()
As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()
You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()