单选题You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A VRRPB GLBPC IRDPD HSRPE None of the other alternatives apply

单选题
You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()
A

 VRRP

B

 GLBP

C

 IRDP

D

 HSRP

E

 None of the other alternatives apply


参考解析

解析: 暂无解析

相关考题:

Which three pre-sales Smart Design documents are available to help you implement and install a solution?()A、 Design GuideB、 Cisco Configuration AssistantC、 Implementation GuideD、 Small Business Product GuideE、 Solution ProfileF、 Application Notes

You want to implement a high availability network using two Cisco routers. You also want to  ensure that the stat of the WAN interfaces can be tracked in doing so.  Which router redundancy  protocol cannot be configured for interface tracking? ()A、 GLBPB、 HSRPC、 RPRD、 VRRPE、 SLBF、 RPR+G、 None of the other alternatives apply

You need to implement a high availability design in the Company routed network.  Which protocol  allows for the automatic selection and simultaneous use of multiple available gateways as well as  automatic failover between those gateways?()A、 VRRPB、 GLBPC、 IRDPD、 HSRPE、 None of the other alternatives apply

Which two statements regarding configuring high availabily in the Cisco UCS is correct?()A、High availability is enabled during the configuration of either HSRP or VRRP from global configuration modeB、High availability is configured during the initial setup of both Fabric interconnectsC、High availability can only be configured via the CMCD、High availability is enabled during theinitial configuration of one of the Fabric lnterconnects

The company wants to evaluate making all business office users administrators on their client computers. You need to design a method to ensure that this change can be made in a manner that meets business and security requirements. What should you do?()A、On all domain controllers, implement registry access auditing for all registry keys that are considered sensitive by the company’s written security policyB、On all client computers, implement logon auditing for all user account logonsC、On all client computers, configure registry access auditing for all registry keys that are considered sensitive by the company’s written security policyD、On all domain controllers, implement logon auditing for all user account logons

You need to design a PKI solution that meets business and security requirements. What should you do?()A、Implement an enterprise root CA in the corp.woodgrovebank.com domain.Implement subordinate CAs in each child domain. Take the root CA offlineB、Implement an enterprise root CA in the corp.woodgrovebank.com domainC、Implement an enterprise root CA in each of the child domains. Take the enterprise CA in each domain offlineD、Implement an enterprise root CA in the corp.woodgrovebank.com domain. Implement a stand-alone root CA in each of the child domains

You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()A、 SVI interfaceB、 Access portC、 EtherChannel port channelD、 Loopback interfaceE、 Routed portF、 BVI interface

You need to configure two Company routers for high availability.  Which protocol enables a group  of routers to form a single virtual router and use the real IP address of a router as the gateway  address? ()A、 HSRPB、 IRDPC、 Proxy ARPD、 GLBPE、 VRRPF、 None of the other alternatives apply

Which factor is least likely to affect the scalability of a VPN design?()A、 number of branch officesB、 number of IGP routing peersC、 remote Office and home worker throughput bandwidth requirementsD、 high availability requirementsE、 Supported applications

You need to design an access control strategy for the marketing application. You solution must minimize impact on server and network performance. What should you do?()A、Require client computers to connect to the marketing application by using a VPN connectionB、Use IPSec to encrypt communications between the servers in the New York and Atlanta officesC、Require the high security setting on Terminal Services connections to the marketing applicationD、Configure all marketing application Web pages to require SSL

You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003.   Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server.   You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization.   What should you do? ()A、 Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.B、 Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.C、 Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.D、 Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.

You have an Exchange Server 2010 organization.  The network contains an Exchange Server 2010 Mailbox server named Server1. All mailboxes are stored on Server1.  You perform a Typical installation of Exchange Server 2010 on a new server named Server2. You plan to implement redundancy for mailbox access.  You need to recommend a solution that ensures that client computers can reconnect to their mailboxwithin five minutes if Server1 fails.  What should you recommend?()A、Configure cluster continuous replication (CCR). Implement a file share witness.B、Configure a Network Load Balancing cluster that includes Server1 and Server2. Implement Active Directory-integrated DNS zones.C、Configure a database availability group (DAG) that includes Server1 and Server2. Set the time to  live (TTL) for the DNS record.D、Configure a database availability group (DAG) that includes Server1 and Server2. Use the same certificate for both servers.

Your company has an Active Directory forest named contoso.com.  You plan to deploy an Exchange Server 2010 organization that will contain two servers.  Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed.  You plan to add both servers to a database availability group (DAG).  You need to recommend a high-availability solution for the Client Access server role.  Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable.  What should you recommend?()A、Create and configure a Client Access server array, and then install a hardware load balancer.B、Create and configure a Client Access server array, and then install Windows Network Load Balancingon both servers.C、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then implement DNS round robin.D、Deploy Microsoft Internet Security and Acceleration (ISA) Server 2006, and then install Windows Network Load Balancing.

You have an Exchange Server 2010 organization.  You need to recommend a solution that prevents the permanent deletion of e-mail messages from themailboxes of employee who have been dismissed from the company.  What should you recommend?()A、Implement managed folders.B、Implement a legal hold for each mailbox.C、Implement a Retention Policy for each mailbox.D、Implement an Outlook Protection Rule for each mailbox.

You have an Exchange Server 2010 organization.  The network contains two Mailbox servers that are configured in a database availability group (DAG). You plan to implement a disaster recovery solution.  You need to recommend a solution that ensures that the active mailbox database copy is unaffected bythe backup process.  You want to achieve this goal while minimizing costs.  What should you recommend?()A、Windows Server BackupB、Network Attached Storage (NAS) snapshotsC、Microsoft System Center Configuration ManagerD、Microsoft System Center Data Protection Manager

You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

You need to recommend a solution for promoting the RODC in the new branch office.What should you include in the recommendations?()A、Implement the Windows Search service and implement a custom iFilter.B、Implement File Server Resource Manager (FSRM) and configure file classifications.C、Implement Microsoft SharePoint Foundation 2010 and create a custom workflow.D、Implement a Distributed File System (DFS) namespace and configure folder targets.

单选题You are a network administrator for your company. The company has a main office and two branch offices. The branch offices are connected to the main office by T1 lines. The network consists of three Active Directory sites, one for each office. All client computers run either Windows 2000 Professional or Windows XP Professional. Each office has a small data center that contains domain controllers, WINS, DNS, and DHCP servers, all running Windows Server 2003.   Users in all offices connect to a file server in the main office to retrieve critical files. The network team reports that the WAN connections are severely congested during peak business hours. Users report poor file server performance during peak business hours. The design team is concerned that the file server is a single point of failure. The design team requests a plan to alleviate the WAN congestion during business hours and to provide high availability for the file server.   You need to provide a solution that improves file server performance during peak hours and that provides high availability for file services. You need to minimize bandwidth utilization.   What should you do? ()A Purchase two high-end servers and a shared fiber-attached disk array. Implement a file server cluster in the main office by using both new servers and the shared fiber-attached disk array.B Implement Offline Files on the client computers in the branch offices by using Synchronization Manager. Schedule synchronization to occur during off-peak hours.C Implement a stand-alone Distributed File System (DFS) root in the main office. Implement copies of shared folders for the branch offices. Schedule replication of shared folders to occur during off-peak hours by using scheduled tasks.D Implement a domain Distributed File System (DFS) root in the main office. Implement DFS replicas for the branch offices. Schedule replication to occur during off-peak hours.

单选题You need to configure two Company routers for high availability.  Which protocol enables a group  of routers to form a single virtual router and use the real IP address of a router as the gateway  address? ()A HSRPB IRDPC Proxy ARPD GLBPE VRRPF None of the other alternatives apply

单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()ACreate an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.BCreate an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.CCreate a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.DCreate an HttpSessionListener class and implement the sessionCreated method with that block of code.

单选题Which factor is least likely to affect the scalability of a VPN design?()A number of branch officesB number of IGP routing peersC remote Office and home worker throughput bandwidth requirementsD high availability requirementsE Supported applications

单选题You need to block messages from senders that do not comply sender policy framework (SPF).What do you need to implement?()AReceive connectorBSender ID FilteringCSender FilteringDSend connector

多选题Servers in your environment run Windows Server 2003. You plan to configure a highly available file server. You need to choose the appropriate high-availability technology and the minimum Windows Server 2003 edition for this server.  Which technology and edition should you choose?()Afailover clusteringBNetwork Load BalancingCWindows Server 2003, Standard EditionDWindows Server 2003, Enterprise Edition

单选题You need to recommend a high-availability solution for the file servers in Branch2 that supports the museum's planned changes    What should you include in the recommendation?()Aa standalone Distributed File System (DFS) namespace and DFS ReplicationBa domain-based Distributed File System (DFS) namespace and DFS ReplicationCFailover Clustering and Clustered Shared VolumesDNetwork Load Balancing (NLB) and Storage Manager

多选题You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()ASVI interfaceBAccess portCEtherChannel port channelDLoopback interfaceERouted portFBVI interface

单选题You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()ADesign a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersBDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersCDesign a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersDDesign a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers

单选题You want to implement a high availability network using two Cisco routers. You also want to  ensure that the stat of the WAN interfaces can be tracked in doing so.  Which router redundancy  protocol cannot be configured for interface tracking? ()A GLBPB HSRPC RPRD VRRPE SLBF RPR+G None of the other alternatives apply