单选题In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()AMDFBProxyCDemarcation pointDSmart jack

单选题
In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()
A

MDF

B

Proxy

C

Demarcation point

D

Smart jack


参考解析

解析: 暂无解析

相关考题:

In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:() A. MDFB. ProxyC. Demarcation pointD. Smart jack

Which tool employs an intuitive GUI to apply common services across Cisco switches, routers, and access points? () A. Cisco VAM2+B. Cisco Network AssistantC. Cisco SDMD. Cisco IPS

What is a criteria of the enterprise composite network model?() A. includes all modules needed to meet any network designB. defines flexible boundaries between modules for scalability requirementsC. clearly defines module boundaries and demarcation points to identify where traffic isD. requires specific core, distribution, and access layer requirements to match the model

Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.

A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()A、hostB、IP phoneC、access layer switchD、distribution layer switchE、core layer switch

Which two series of Cisco Catalyst switches, when placed in the distribution layer, effectively pass high amounts of network traffic between the core and access layers while aggregating access? ()A、 Cisco Catalyst 2800B、 Cisco Catalyst 3550C、 Cisco Catalyst 3750D、 Cisco Catalyst 4500E、 Cisco Catalyst 6500

Why is STP required when VLANs span access layer switches?()A、to ensure a loop-free topologyB、to protect against user-side loopsC、in order to support business applicationsD、because of the risk of lost connectivity without STPE、for the most deterministic and highly available network topology

In which situation would the use of a static route be appropriate?()A、To configure a route to the first Layer 3 device on the network segment.B、To configure a route from an ISP router into a corporate network.C、To configure a route when the administrative distance of the current routing protocolis too low.D、To reach a network is more than 15 hops away.E、To provide access to the Internet for enterprise hosts.

In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()A、MDFB、ProxyC、Demarcation pointD、Smart jack

You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()A、The user will be instructed to call the network administrator.B、The user will fail authentication.C、The user will be prompted to install a new device certificate on the MAG Series device.D、The user will successfully authenticate and have full network access.

Which type of IBM Tivoli Access Manager for Enterprise Single Sign-On built-in application connector should be used to integrate with Novell eDirectory as a backend enterprise directory?()A、Windows NT ConnectorB、Generic (LDAP) ConnectorC、Network Information Service ConnectorD、Active Directory Service Interfaces Connector

Which of the following allows network administrators to easily apply common services and employ features across Cisco switches, routers, and access points with an intuitive GUI?()A、Cisco IPSB、Cisco Network AssistantC、Cisco VAM2+D、Cisco SDM

A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones.  Where should troubleshooting about this connectivity issue be focused?()A、DNSB、first-hop redundancy protocolC、DHCP server and optionsD、VLAN mappingE、client network configurationF、routing protocols

What is a criteria of the enterprise composite network model?()A、 includes all modules needed to meet any network designB、 defines flexible boundaries between modules for scalability requirementsC、 clearly defines module boundaries and demarcation points to identify where traffic isD、 requires specific core, distribution, and access layer requirements to match the model

Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()A、 Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layerB、 Provides host-level redundancy by connecting each end device to 2 separate Access switches C、 Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRPD、 Include a link between two Access switches to support summarization of routing information

If an enterprise customer required a switch for their branch office access layer, which family of switches would the customer likely choose from?()A、Cisco Catalyst 2000 and 3000B、Cisco NexusC、Cisco Catalyst 4000 and 6000D、Cisco SFS 3000/7000

Your network consists of a single Active Directory domain. All domain controllers run Windows  Server 2008 R2.     The Audit account management policy setting and Audit directory services access setting are  enabled for the entire domain.     You need to ensure that changes made to Active Directory objects can be logged. The logged  changes must include the old and new values of any attributes.     What should you do()A、Enable the Audit account management policy in the Default Domain Controller Policy.B、Run auditpol.exe and then configure the Security settings of the Domain Controllers OU.C、Run auditpol.exe and then enable the Audit directory service access setting in the Default Domain policy.D、From the Default Domain Controllers policy, enable the Audit directory service access setting and enable directory

Your network contains a single Active Directory domain. All domain controllers run Windows Server   2008 R2. There are 1,000 client computers that run Windows 7 and that are connected to managedswitches.   You need to recommend a strategy for network access that meets the following requirements:   èUsers are unable to bypass network access restrictions.   èOnly client computers that have up-to-date service packs installed can access the network.   èOnly client computers that have up-to-date anti-malware software installed can access the network.   What should you recommend?()A、Implement Network Access Protection (NAP) that uses DHCP enforcement.B、Implement Network Access Protection (NAP) that uses 802.1x enforcement.C、Implement a Network Policy Server (NPS), and enable IPsec on the domain controllers.D、Implement a Network Policy Server (NPS), and enable Remote Authentication Dial-In User Service  (RADIUS) authentication on the managed switches.

单选题A new building has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, only a few laptops using  wireless are reported to have problems, while other desktops, IP phones, and most other wireless laptops are fully operational. Additional information received about the problem indicates that, while the problematic wireless laptops cannot reach internal corporate websites, they can reach the Internet.  Where should troubleshooting about this connectivity issue be focused?()Aclient network configurationBVLAN mappingCrouting protocolsDfirst-hop redundancy protocol

单选题During testing of network redundancy in a fully meshed enterprise campus, a problem has been reported. Both distribution multilayer switches are fully configured for redundancy; clients operate normally when the primary multilayer distribution switch is operating. All clients drop connections outside of their respective access layer group when the primary distribution switch is shut down and the secondary distribution switch is still operational. Additional information indicates that the secondary  distribution switch is able to ping major corporate and Internet locations.  Which item would be the best point of troubleshooting for this connectivity issue? ()Aclient network configurationBVLAN mappingCinter-switch trunk configurationDUDLD configurationEfirst-hop redundancy protocol

单选题What is a criteria of the enterprise composite network model?()A includes all modules needed to meet any network designB defines flexible boundaries between modules for scalability requirementsC clearly defines module boundaries and demarcation points to identify where traffic isD requires specific core, distribution, and access layer requirements to match the model

单选题Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.

单选题You have configured the Odyssey Access Client with a profile which has the "Disable Server Verification" setting cleared.What will be the result if the device certificate on the MAG Series device has expired and the user attempts to authenticate?()AThe user will be instructed to call the network administrator.BThe user will fail authentication.CThe user will be prompted to install a new device certificate on the MAG Series device.DThe user will successfully authenticate and have full network access.

多选题You work as the enterprise exchange administrator at Xxx .The Xxx network is running in a Microsoft Exchange Server 2010 environment.A SMTP server on the Internet has rejected some email sent from Xxx .What actions must you take to determine why this happened?()AYou must use the Windows Remote Management (WinRM) over SSL.BYou must access the Send connectors and use the Verbose setting in the Protocol logging.CYou must configure EdgeSync synchronization.DYou must check the protocol log files.EYou must implement a new managed content setting.

单选题If an enterprise customer required A switch for their branch office access layer, which family of switches would the customer likely choose from?()ACisco SFS 3000/7000BCisco Catalyst 2000 and 3000CCisco Catalyst 4000 and 6000DCisco Nexus

单选题Which tool employs an intuitive GUI to apply common services across Cisco switches, routers, and access points? ()ACisco VAM2+BCisco Network AssistantCCisco SDMDCisco IPS

单选题You are the network administrator for your company. The network consists of a single Active Directory domain. The network contains Windows Server 2003 file servers. The network also contains a Windows Server 2003 computer named Server1 that runs Routing and Remote Access and Internet Authentication Service (IAS). Server1 provides VPN access to the network for users’ home computers.   You suspect that an external unauthorized user is attempting to access the network through Server1. You want to log the details of access attempts by VPN users when they attempt to access the network. You want to compare the IP addresses of users’ home computers with the IP addresses used in the access attempts to verify that the users are authorized.  You need to configure Server1 to log the details of access attempts by VPN users.   What should you do?  ()A Configure the system event log to Do not overwrite.B In IAS, in Remote Access Logging, enable the Authentication requests setting.C Configure the Remote Access server to Log all events.D Create a custom remote access policy and configure it for Authentication-Type.

多选题Which two series of Cisco Catalyst switches, when placed in the distribution layer, effectively pass high amounts of network traffic between the core and access layers while aggregating access? ()ACisco Catalyst 2800BCisco Catalyst 3550CCisco Catalyst 3750DCisco Catalyst 4500ECisco Catalyst 6500