单选题Which statement about data center access layer design modes is correct?()AThe access layer is the first oversubscription point in a data center design.BWhen using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.CWhen using a Layer 2 looped design, VLANs are not extended into the aggregation layer.DWhen using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.EThe data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

单选题
Which statement about data center access layer design modes is correct?()
A

The access layer is the first oversubscription point in a data center design.

B

When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.

C

When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.

D

When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.

E

The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.


参考解析

解析: 暂无解析

相关考题:

Refer to the exhibit. Which two statements about the topologies shown are correct?() A. Design 1 is a looped triangle design.B. Design 2 is a looped triangle design.C. Design 2 achieves quick convergence using RSTP.D. Both designs supportstateful services at the aggregation layer.E. Design 2 is the most widely deployed in enterprise data centers.

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.

Which two design recommendations are most appropriate when EIGRP is the data center core routing protocol?() A. Summarize data center subnets.B. Use passive interfaces to ensure appropriate adjacencies.C. Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.D. Adjust the default bandwidth value to ensure proper bandwidth on all links.E. Advertise a default summary route into the data center core from the aggregation layer.

Which statement about access lists that are applied to an interface is true?() A.you can apply multiple access lists with the same protocol or in different…B.you can config one access list,per direction,per layer 3 protocolC.you can placeasmanyaccess lists as you want on any interfaceD.you can apply ony one access list on any interface

Which statement about the S-Series native FTP proxy is not true?() A、 both active and passive modes FTP are supportedB、 by default the FTP proxy uses port 8021C、 access polices may apply to native FTP trafficD、 data loss prevention policies may apply to native FTP trafficE、 authentication is supported in transparent mode

When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()A、Layer 2 access link QoS designB、enterprise-to-service-provider mapping modelsC、Layer 3 link access QoS designD、service provider service level agreementsE、Layer 2 link access load balancing

Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.

Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A、 LWAPP encrypts control traffic between the AP and the controller.B、 LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC、 LWAPP encrypts both control traffic and user data.D、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

In the three-layer hierarchical network design model;what’s associated with the access layer?()A、optimized transport structureB、high port densityC、boundary definitionD、data encryptionE、local VLANsF、route summaries

Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A、 The data traffic between the access point and controller is not encrypted.B、 The data traffic is encapsulated with LWAPP.C、 The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D、 The data traffic is encrypted with AES.E、 All of the above

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()A、 Summarize data center subnets.B、 Use passive interfaces to ensure appropriate adjacencies.C、 Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.D、 Adjust the default bandwidth value to ensure proper bandwidth on all links.E、 Advertise a default summary route into the data center core from the aggregation layer.

Which statement about data center access layer design modes is correct?()A、The access layer is the first oversubscription point in a data center design.B、When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C、When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D、When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.E、The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.

he requirement for high availability within the Data Center network may cause the designer toconsider which one of the following solutions?()A、 Construct a hierarchical network design using EtherChannel between a server and two VDCsfrom the same physical switchB、 Utilize Cisco NSF with SSO to provide intrachassis SSO at Layers 2 to 4C、 Define the Data Center as an OSPF NSSA area, advertising a default route into the DC And summarizing the routes out of the NSSA to the Campus CoreD、 Implement network services for the Data Center as a separate services layer usingactive/active model that is more predictable in failure conditions

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.

In a base e-Commerce module design, which routing statement is correct?()A、Routing is mostly static.B、Hardcoded IP addresses are used to support failover.C、Inbound servers use the CSM or ACE as the default gateway.D、VLANs between the access layer switches are used for FHRP protocols.

Which statement correctly describes a situation in which VRFs are used in the data center?()A、Partitioning of network resources is enabled.B、VRFs cannot support path isolation from MAN/WAN designs.C、VRFs cannot be used to map a virtualized data center to a MPLS implementation.D、VRFs do not allow for the use of application services with multiple access topologies.E、An access design using a VRF allows for an aggregation layer service module solution.

Which statement about the Lightweight Access Point Protocol (LWAPP) is true? ()A、 LWAPP encrypts both control traffic and user data.B、 LWAPP encrypts user traffic with an x.509 certificate using AES-CCMP.C、 When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco  Aironet APs.D、 LWAPP encrypts control traffic between the AP and the controller.E、 None of the other alternatives apply.

Which statement about access lists that are applied to an interface is true?()A、you can apply multiple access lists with the same protocol or in different…B、you can config one access list,per direction,per layer 3 protocolC、you can place as many access lists as you want on any interfaceD、you can apply ony one access list on any interface

Which statement is TRUE about the CacheFactory class ?()A、 it is a topology agnostic way to access NamedCachesB、 it provides mechanisms to manage underlying remote data sourcesC、 both A and B are TRUED、Neither A nor B are TRUE

多选题Which two components should be part of a security implementation plan?()Adetailed list of personnel assigned to each task within the planBa Layer 2 spanning tree design topologyCrollback guidelinesDplacing all unused access ports in VLAN 1 to proactively manage port securityEenabling SNMP access to Cisco Discovery Protocol data for logging and forensic analysis

单选题Which statement is TRUE about the CacheFactory class ?()A it is a topology agnostic way to access NamedCachesB it provides mechanisms to manage underlying remote data sourcesC both A and B are TRUEDNeither A nor B are TRUE

单选题Which statement about access lists that are applied to an interface is true?()Ayou can apply multiple access lists with the same protocol or in different…Byou can config one access list,per direction,per layer 3 protocolCyou can placeasmanyaccess lists as you want on any interfaceDyou can apply ony one access list on any interface

单选题Which statement about the Lightweight Access Point Protocol (LWAPP) is true?()A LWAPP encrypts control traffic between the AP and the controller.B LWAPP encrypts user traffic with a x.509 certificate using AES-CCMPC LWAPP encrypts both control traffic and user data.D When set to Layer 3, LWAPP uses a proprietary protocol to communicate with the Cisco Aironet APs.

多选题You need to design the VLAN scheme for the Company network. Which two statements are true  about best practices in VLAN design?()ARouting should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.BRouting should always be performed at the distribution layer.CVLANs should be localized to a switch.DVLANs should be localized to a single switch unlessvoice VLANs are being utilized.ERouting should not be performed between VLANs located on separate switches.

单选题Which statement about access lists that are applied to an interface is true?()Ayou can apply multiple access lists with the same protocol or in different direction.Byou can config one access list,per direction,per layer 3 protocolCyou can place as many access lists as you want on any interfaceDyou can apply only one access list on any interface

单选题Which statement about the S-Series native FTP proxy is not true?()A both active and passive modes FTP are supportedB by default the FTP proxy uses port 8021C access polices may apply to native FTP trafficD data loss prevention policies may apply to native FTP trafficE authentication is supported in transparent mode

单选题Which statement about data center access layer design modes is correct?()A The access layer is the first oversubscription point in a data center design.B When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.C When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.D When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.E The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.

单选题Which statement is true about the data traffic between the access point named TKAP1 and  controller TKC1?()A The data traffic between the access point and controller is not encrypted.B The data traffic is encapsulated with LWAPP.C The data traffic is switched at the access point before being sent to the WLAN controller where  VLAN tagging and QoS are applied.D The data traffic is encrypted with AES.E All of the above