多项选择题
Which two statements are true about trust boundaries?()
A.Classifying and marking traffic should be done as close to the traffic source as possible.
B.Classifying and marking traffic should be done at the distribution layer.
C.Traffic is classified and marked as it travels through the network.
D.If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.
E.The trust boundary moves depending on the type of traffic entering the network.
相关考题
-
单项选择题
Refer to the exhibit. What problem is preventing users on VLAN 100 from pinging addresses on VLAN 200?()
A.No default route on DLS1.
B.Encapsulation mismatch between switches.
C.Native VLAN mismatch.
D.Subinterfaces should be created on Fa0/7 and Fa0/8 on DLS1.
E.Trunking needs to be enabled.
F.The ip routing command is missing on DLS1. -
多项选择题
Cisco Express Forwarding has been enabled on router TK1. With CEF, prefixes that require exception processing can be cached with one of which four special adjacencies? ()
A.Kick
B.Drop
C.Forward
D.Null
E.Discard
F.Glean
G.Express -
多项选择题
Your boss, Miss ,is interested in CEF. What should you tell her? ()
A.The FIB lookup is based on the Layer 3 destination address prefix (shortest match).
B.The adjacent table is derived from the ARP table.
C.The FIB table is derived from the IP routing table.
D.When the adjacency table is full, a CEF TCAM table entry points to the Layer 3 engine to redirect the adjacency.
E.CEF IP destination prefixes are stored in the TCAM table, from the least specific to the most specific entry.
F.When the CEF TCAM table is full, packets are dropped.
