单选题In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()AMDFBProxyCDemarcation pointDSmart jack
单选题
In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()
A
MDF
B
Proxy
C
Demarcation point
D
Smart jack
参考解析
解析:
暂无解析
相关考题:
CDP is being used throughout the Ezonexam network. What are two reasons why the Ezonexam network administrator would use CDP? (Choose two)A. To determine the status of network services on a remote deviceB. To obtain the IP Address of a connected device in order to telnet to the deviceC. To verify the type of cable interconnecting two devicesD. To verify Layer 2 connectivity between two devices when Layer 3 failsE. To obtain VLAN information from directly connected swticehsF. To determine the status of the routing protocols between directly connected routersG. To support automatic network failover during outages
Which of the following would be used to lock all of the primary communication equipment of abuilding, including its demarcation point?() A.MTRB.MDFC.Smart jackD.IDF
In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:() A. MDFB. ProxyC. Demarcation pointD. Smart jack
In 8011 terminology.all communication was to go through the base station, called an(75)A.Access ChannelB.Access SystemC.Access PointD.Network Access Point
What is a criteria of the enterprise composite network model?() A. includes all modules needed to meet any network designB. defines flexible boundaries between modules for scalability requirementsC. clearly defines module boundaries and demarcation points to identify where traffic isD. requires specific core, distribution, and access layer requirements to match the model
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests?() A. transparentB. proxyC. reverse proxyD. direct
Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system . Where can an IPS sensor be placed in an enterprise network?()A、core layerB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunking
To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC、 to two core switches from redundant distribution switches connected with Layer 2 linkD、 to two core switches from redundant distribution switches connected with Layer 3 linkE、 to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests?()A、transparentB、proxyC、reverse proxyD、direct
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabledrouters to intercept user requests?()A、 transparentB、 proxyC、 reverse proxyD、 direct
Which of the following wiring distribution components should be chosen to provide level integrateddiagnostic capabilities?()A、Vampire tapB、Smart jackC、Demarcation pointD、Programmable logic controller
In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()A、MDFB、ProxyC、Demarcation pointD、Smart jack
Which of the following would be used to lock all of the primary communication equipment of abuilding, including its demarcation point?()A、MTRB、MDFC、Smart jackD、IDF
A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones. Where should troubleshooting about this connectivity issue be focused?()A、DNSB、first-hop redundancy protocolC、DHCP server and optionsD、VLAN mappingE、client network configurationF、routing protocols
What is a criteria of the enterprise composite network model?()A、 includes all modules needed to meet any network designB、 defines flexible boundaries between modules for scalability requirementsC、 clearly defines module boundaries and demarcation points to identify where traffic isD、 requires specific core, distribution, and access layer requirements to match the model
Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()A、 Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layerB、 Provides host-level redundancy by connecting each end device to 2 separate Access switches C、 Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRPD、 Include a link between two Access switches to support summarization of routing information
In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()A、enable backbone fastB、enable uplink fastC、disable portfastD、enable portfast
单选题A new floor has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, a few desktop PCs have limited corporate access but not Internet access. Most other desktop PCs, all laptops, and IP phones are working correctly. Additional information indicates that the desktop PCs are obtaining IP host addresses from the DHCP server, which is intended for only the IP phones. Where should troubleshooting about this connectivity issue be focused?()ADNSBfirst-hop redundancy protocolCDHCP server and optionsDVLAN mappingEclient network configurationFrouting protocols
单选题A new building has been added to the enterprise campus network, providing client access for desktop PCs, laptops, and IP phones for employees and guests. During verification, only a few laptops using wireless are reported to have problems, while other desktops, IP phones, and most other wireless laptops are fully operational. Additional information received about the problem indicates that, while the problematic wireless laptops cannot reach internal corporate websites, they can reach the Internet. Where should troubleshooting about this connectivity issue be focused?()Aclient network configurationBVLAN mappingCrouting protocolsDfirst-hop redundancy protocol
单选题Why is STP required when VLANs span access layer switches?()Ato ensure a loop-free topologyBto protect against user-side loopsCin order to support business applicationsDbecause of the risk of lost connectivity without STPEfor the most deterministic and highly available network topology
单选题To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()Ato a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkBto a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkCto two core switches from redundant distribution switches connected with a Layer 2 linkDto two core switches from redundant distribution switches connected with a Layer 3 linkEto two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
单选题You are the network consultant from Cisco.com. Please point out the reason that STP required when VLANs do not span access layer switches.()Aensure a loop-free topologyBprotect against user-side loopsCsupport business applicationsDrisk of lost connectivity without STP
单选题In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()Aenable backbone fastBenable uplink fastCdisable portfastDenable portfast
单选题Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabledrouters to intercept user requests?()A transparentB proxyC reverse proxyD direct
单选题In an enterprise setting, access switches providing network connectivity placed throughout abuilding are typically connected to a backbone called the:()AMDFBProxyCDemarcation pointDSmart jack
单选题What is a criteria of the enterprise composite network model?()A includes all modules needed to meet any network designB defines flexible boundaries between modules for scalability requirementsC clearly defines module boundaries and demarcation points to identify where traffic isD requires specific core, distribution, and access layer requirements to match the model
单选题What is a criteria of the enterprise composite network model?()Aincludes all modules needed to meet any network designBdefines flexible boundaries between modules for scalability requirementsCclearly defines module boundaries and demarcation points to identify where traffic isDrequires specific core, distribution, and access layer requirements to match the model
单选题Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()A Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layerB Provides host-level redundancy by connecting each end device to 2 separate Access switches C Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRPD Include a link between two Access switches to support summarization of routing information