单选题A new Backup Connection is being deployed on a remote site router. the stability of the connection has been a concern. in order to provide more information to EIGRP Regarding this interface, You wish to incorporate the "Reliability" cost metric in the EIGRP Calculation with the command metric weights 1 0 1 0 1. What impact will this modification on the remote site router have for other existing EIGRP neighborships from the same EIGRP Domain?()AExisting Neighbors will immediately begin using the new metric.BExisting Neighbors will use the new metric after clearing the EIGRP Neighbors.CExisting Neighbors will resync, maintaining the neighbor relationshipDAll ecisting neighbor relationships will go down

单选题
A new Backup Connection is being deployed on a remote site router. the stability of the connection has been a concern. in order to provide more information to EIGRP Regarding this interface, You wish to incorporate the "Reliability" cost metric in the EIGRP Calculation with the command metric weights 1 0 1 0 1. What impact will this modification on the remote site router have for other existing EIGRP neighborships from the same EIGRP Domain?()
A

Existing Neighbors will immediately begin using the new metric.

B

Existing Neighbors will use the new metric after clearing the EIGRP Neighbors.

C

Existing Neighbors will resync, maintaining the neighbor relationship

D

All ecisting neighbor relationships will go down


参考解析

解析: 暂无解析

相关考题:

A company has recently received a new ADSL backup Internet connection. Which of the followingwill MOST likely be used between the modem and the ISP?() A.PPPoEB.RASC.IPSecD.MSCHAP

Which three of these are major scaling, sizing, and performance considerations for an IPsec design?() A. connection speedB. number of remote sitesC. features to be supportedD. types of devices at the remote siteE. whether packets are encrypted using 3DES or AESF. number of routes in the routing table at the remote site

A virtual (71) network, or VPN, is an encrypted connection over the Internet from a device to a network. The encrypted connection helps ensure that sensitive data is safely (72). It prevents (73) people fromeavesdropping on the traffic and allows the user to conduct work remotely. Traffic on the virtual network is sent securely by establishing an encrypted connection across the Internet known as a (74).A remote access VPN securely connects a device outside the corporate office. A site-to-site VPN connects the corporate office to branch offices over the Internet. Site-to-site VPNs are used when distance makes it impractical to have direct network connections between these offices. Think of site-to-site access as (75) to network. A.encodedB.encryptedC.storedD.transmitted

A blinking green LED indicates which of the following conditions on a Cisco 1030 Remote EdgeAP?()A、startupB、site survey modeC、lost connection to the controllerD、duplicate IP address

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()A、connection speedB、number of remote sitesC、features to be supportedD、types of devices at the remote site

Which three of these are major scaling, sizing, and performance considerations for an IP secdesign? ()A、 connection speedB、 number of remote sitesC、 features to be supportedD、 types of devices at the remote siteE、 whether packets are encrypted using 3DES or AESF、 number of routes in the routing table at the remote site

A blinking green led indicates which of the following conditions on a cisco 1030 remote edge ap?()A、startupB、site survey modeC、lost connection to the controllerD、duplicate ip address

Acme Company has several offices around the country. The company has deployed a VoIP network with Cisco Unified CallManager in a multisite centralized configuration but the is a requirement to place a call agent at some of the remote sites. Which IOS gateway feature should be deployed at the remote site to enable local call control?()A、Gatekeeper multizoneB、Call Admission Control (CAC)C、Automatic Alternate Routing (AAR)D、Survivable Remote Site Telephony (SRST)E、Cisco Unified CallManager Express (CME)

You are the Cisco Network Designer. Which is not major scaling, sizing, and performance consideration for an IPsec design?()A、 connection speedB、 number of remote sitesC、 features to be supportedD、 types of devices at the remote site

Acme Company has offices around the country. With the use of Cisco Unified CallManager, the company has deployed a VoIP network in a multisite centralized configuration. Which IOS gateway feature should be deployed to enable VoIP devices to register with a local gateway and continue to function when the connection to the Cisco Unified CallManager is broken? ()A、gatekeeper multizoneB、Call Admission Control (CAC)C、Automatic Alternate Routing (AAR)D、Survivable Remote Site Telephony (SRST)

A company has recently received a new ADSL backup Internet connection. Which of the followingwill MOST likely be used between the modem and the ISP?()A、PPPoEB、RASC、IPSecD、MSCHAP

500 systems are being deployed to remote locations. What tool on the remote systems can be used to automate the download and installation of fixes at the remote site?()A、dshB、sumaC、sudoD、smitty

A customer has a requirement for Disaster Recovery for compliance within their industry. Theyhave an RPO of 4 hours and an RTO of 24 hours. Cost is a consideration. What is the most costeffective DR implementation?()A、a disk-to-disk backup solution keeping all storage in the data centerB、a backup solution that includes magnetic tape that is shipped to an off-site storage facilityC、a less powerful copy environment at a hot site with asynchronous mirroring and cluster technologyD、an exact copy of the primary environment at a hot site with remote mirroring and cluster technology

A company with three sites (one local production site, one intermediate site, and one remote site) wants to use Metro/Global Mirror.  Which statement is correct about the volumes at the intermediate site()A、the intermediate site volumes are Metro Mirror target volumes for the remote siteB、the intermediate site volumes are Global Mirror target volumes for the remote siteC、the intermediate site volumes are both Global Mirror source and Metro Mirror target at the same timeD、the intermediate site volumes are alsoFlashCopy sources for the remote site

A customer requires off-site storage for 500 GB per night in backup tapes. The backup site is 560kilometers (350 miles) away. The customer does not require the backup site to run the applicationin the event of failure at the main site. What is the least expensive strategy for the data center toimplement?()A、make online image backupsB、install Global Mirror at the backup siteC、ship nightly backup tapes to the remote siteD、install Tivoli Storage Manager (TSM) and a tape drive at the backup site

A customer has one IBM System Storage DS8300 in their main data center with one IBM DS6800 at their Disaster Recovery (DR) site. They are using the Remote Mirror and Copy (RMC) feature between the sites. They utilize Tivoli Storage Manager for backups. They would like to replace a Microsoft Windows server at the main site with a server at the DR site with a minimal amount of downtime.  Which method will achieve their goals()A、locate the Tivoli Storage Manager data set for the server at the DR site, do a full backup, recover the data to the DS6800, and make the data availableto the serverB、create RMC relationships for all of the data on the server to the DS6800, shut down the server, and make the data available to the new serverC、shut down the server,create RMC relationships for all of the data on the server to the DS6800, and make the data available to the new serverD、recover the TSM backups to the DS6800 at the remote site, and make the data available to the new server

Your network contains a server named Server1 that runs Windows Server 2008 R2. Server1 has Microsoft Exchange Server 2010 deployed. You schedule a backup of the server. You discover that the Exchange Server 2010 transaction log files are purged during the backup. You need to prevent the Exchange Server 2010 transaction log files from being purged. What should you do? ()A、From the properties of the backup, add an exclusion.B、From the properties of the backup, modify the VSS settings.C、From Windows PowerShell, run the New-WBFileSpec cmdlet.D、From Windows PowerShell, run the New-WBBackupTarget cmdlet.

Your network contains several Windows Server 2008 R2 servers that run Windows Server Update   Services (WSUS). The WSUS servers distribute updates to all computers on the internal network. Remote users connect from their personal computers to the internal network by using a split-tunnel VPN  connection.   You need to plan a strategy for patch management that deploys updates on the remote users coputers.   Your strategy must meet the following requirements: èMinimize bandwidth use over the VPN connections.   èRequire updates to be approved on the WSUS servers before they are installed on the client computers. What should you include in your plan?()A、Create a Group Policy object (GPO) to perform client-side targeting.B、 Create a computer group for the remote users¯ computers. Configure the remote user computers touse the internal WSUS server.C、Create a custom connection by using the Connection Manager Administration Kit (CMAK). Deploy the  custom connection to all of the remote users computersD、Deploy an additional WSUS server. Configure the remote userscomputers to use the additional WSUS server. Configure the additional WSUS server to leave the updates on the Microsoft Update Web  site.

You install Windows 2000 Professional on your computer at home. You create a new dial-up connection to connect to your company’s remote access server. You configure the connection to use both of your external modems and to use multilink to bind the modems together. You start the dial-up connection and connect to the remote access server. You notice that only one of the modems is connected to the remote access server. What should you do?()A、Configure the dial-up connection to use a SLIP connection.B、Configure the company’s remote access server to accept multilink connections.C、Replace your modems with new modems that support multilink.D、Grant your user account multilink permission on the company’s remote access.

You plan to deploy a Virtual Desktop Infrastructure (VDI) for the public relations users. You need to identify which additional software must be deployed on the network to support the planned VDI deployment. Which additional software should you identify?()A、Microsoft Forefront Identity Manager (FIM) 2010B、Remote Desktop Session Host (RD Session Host) in redirection modeC、Microsoft Forefront EndPoint Protection 2010D、Remote Desktop Connection Broker (RD Connection Broker)E、Remote Desktop Virtualization Host (RD Virtualization Host)

单选题A customer has a requirement for Disaster Recovery for compliance within their industry. Theyhave an RPO of 4 hours and an RTO of 24 hours. Cost is a consideration. What is the most costeffective DR implementation?()Aa disk-to-disk backup solution keeping all storage in the data centerBa backup solution that includes magnetic tape that is shipped to an off-site storage facilityCa less powerful copy environment at a hot site with asynchronous mirroring and cluster technologyDan exact copy of the primary environment at a hot site with remote mirroring and cluster technology

单选题You install Windows 2000 Professional on your portable computer. You create a new dial up connection to connect to your company’s remote access server. You connect to the remote access server by using the dial up connection. You can connect to the servers on the same segment as the remote access server. You cannot access the shared resources that are on the remote segments from the remote access server. What should you do? ()AConfigure the company remote access server to accept multilink connections.BConfigure the TCP/IP program for the dial up connection to disable IP header compression.CConfigure the TCP/IP properties for the dial up connection to use the default gateway on theremote network.DGrant your user account dial in permission on the company remote access server.

单选题Acme Company has several offices around the country. The company has deployed a VoIP network with Cisco Unified CallManager in a multisite centralized configuration but there is a requirement to place a call agent at some of the remote sites. Which IOS gateway feature should be deployed at the remote site to enable local call control?()A Gatekeeper multizoneB Call Admission Control (CAC)C Automatic Alternate Routing (AAR)D Survivable Remote Site Telephony (SRST)E Cisco Unified CallManager Express (CME)

单选题Your network contains several Windows Server 2008 R2 servers that run Windows Server Update   Services (WSUS). The WSUS servers distribute updates to all computers on the internal network. Remote users connect from their personal computers to the internal network by using a split-tunnel VPN  connection.   You need to plan a strategy for patch management that deploys updates on the remote users coputers.   Your strategy must meet the following requirements: èMinimize bandwidth use over the VPN connections.   èRequire updates to be approved on the WSUS servers before they are installed on the client computers. What should you include in your plan?()ACreate a Group Policy object (GPO) to perform client-side targeting.B Create a computer group for the remote users¯ computers. Configure the remote user computers touse the internal WSUS server.CCreate a custom connection by using the Connection Manager Administration Kit (CMAK). Deploy the  custom connection to all of the remote users computersDDeploy an additional WSUS server. Configure the remote userscomputers to use the additional WSUS server. Configure the additional WSUS server to leave the updates on the Microsoft Update Web  site.

单选题You are the network administrator for Company.You install Windows 2000 Professional on your computer at home. Your computer contains threemodems, each connected to a separate phone line. You create a new dial-up connection to connect toCompany’s remote access server. You configure the connection to dial up all three devices. You start thedial-up connection and connect to the remote access server. You notice that only one of the modems isconnected to the remote access server.You want to use as many modems as possible to make a single connection to the remote access server.What should you do? ()AConfigure the dial-up connection to sue a SLIP connection.BConfigure all three modems to use the same phone line.CConfigure the remote access server to enable multi-link.DConfigure the dial-up connection to only dial two of the three modems.EConfigure the dial-up connection to Enable LCP extensions.

单选题A company with three sites (one local production site, one intermediate site, and one remote site) wants to use Metro/Global Mirror.  Which statement is correct about the volumes at the intermediate site()Athe intermediate site volumes are Metro Mirror target volumes for the remote siteBthe intermediate site volumes are Global Mirror target volumes for the remote siteCthe intermediate site volumes are both Global Mirror source and Metro Mirror target at the same timeDthe intermediate site volumes are alsoFlashCopy sources for the remote site

单选题You are the Cisco Network Designer. Which is not major scaling, sizing, and performance consideration for an IPsec design?()A connection speedB number of remote sitesC features to be supportedD types of devices at the remote site