Information Technology Reference
In-Depth Information
11. Which of the following is a distribution layer best practice?
a.
Reduce switch peering and routing
b.
Use HSRP and summarize routes
c.
Disable trunking and use RPVST+
d.
Offload SSL sessions and use load balancers
12. Which of the following is a core layer best practice?
a.
Reduce switch peering and routing
b.
Use HSRP and summarize routes
c.
Disable trunking and use RPVST+
d.
Offload SSL sessions and use load balancers
13. Which of the following is a DC aggregation layer best practice?
a.
Reduce switch peering and routing
b.
Use HSRP and summarize routes
c.
Disable trunking and use RPVST+
d.
Offload SSL sessions and use load balancers
14. Which of the following are threats to the edge distribution?
a.
IP spoofing
b.
Network discovery
c.
Packet-capture devices
d.
All of the above
15. An enterprise network has grown to multiple buildings supporting multiple depart-
ments. Clients access servers that are in local and other buildings. The company secu-
rity assessment has identified policies that need to be applied. What do you
recommend?
a.
Move all departments to a single building to prevent unauthorized access.
b.
Move all servers to one of the LAN client segments.
c.
Move all servers to a server farm segment that is separate from client LANs.
d.
Move all servers to the building distribution switches.
Search WWH ::




Custom Search