Which two options provide the best loop protection in this topology, regardless of a bridged domain configuration?
Which two options are characteristics of firewall transparent mode operations in a firewall solution design?
Which two options will minimize the impact of the trusted NMS polling your network in this situation?
Which two mechanisms can you use to isolate the data center area from the hub-and-spoke area without losing IP connectivity?
Which three reasons to deploy an IDS sensor in promiscuous mode when you design a security solution are true?