单选题When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()ARFPBRFCCSLC/SLADSOW
单选题
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()
A
RFP
B
RFC
C
SLC/SLA
D
SOW
参考解析
解析:
暂无解析
相关考题:
When a sentence changes from a statement to a general/ special question, which movement is struc-turally required A NP–movement/WH-movementB NP–movement/Aux-movementC AUX-movement/WH–movementD WH–movement/AUX-movement
Which of the following statements describe the use of the keywordstatic?a) Within the body of a function: A static variable maintains its valuebetween function revocationsb) Within a module: A static variable is accessible by all functionswithin that modulec) Within a module: A static function can only be called by otherfunctions within that module
What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?() A. determine types of protocols to be supportedB. determine the environment in which the router will be usedC. select the number of WAN ports requiredD. select the number of LAN ports required
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?() A.RFPB.RFCC.SLC/SLAD.SOW
Wh.ch version of spanning tree is recommended for the enterprise campus?()A、 CSTB、 MSTC、 STPD、 PVST+E、 PVRST+
Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()A、 FHRP to remote branches.B、 Layer 3 MPLS VPNs routing.C、 Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.D、 Intrusion prevention, QoS, and stateful firewall support network wide.
If the default VDC is configured to limit resources to a specific module type, what happens when a module that does not match the resource type is installed?() A、 The module is powered up, and interfaces are in an "admin down" state.B、 The module is denied power, and a syslog message is generated.C、 The module is powered up, and interfaces are allocated to VDC0.D、 The module is powered up, and interfaces are allocated to VDC100.
When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A、 Filtering is only useful when combined with route summarizationB、 It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC、 IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD、 The primary limitation of router filtering is that it can only be applied on outbound updates
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
Where does Layer2 de-encapsulation occur on the ERX Edge Router?()A、on the SRPB、on the I/O adapterC、on the egress line moduleD、on the ingress line module
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A、RFPB、RFCC、SLC/SLAD、SOW
A banking customer deployed an IBM BladeCenter chassis with one Brocade 8Gb SAN switch module. The customer requires an 8Gb uplink or higher. Which configuration will meet this request?()A、Brocade Enterprise 20-port 8Gb SAN switch module B、Brocade 20-port 8Gb SAN switch module and Brocade Advanced Performance Monitoring for IBM BladeCenter share C、Brocade Enterprise 10-port 8Gb SAN switch module D、Brocade 10-port 8Gb SAN switch module and Brocade Advanced Performance Monitoring for IBM BladeCenter
When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()A、for a SAN768B DirectorB、for a second TS3500 Tape LibraryC、for a second EXP5060 Expansion UnitD、for an additional DS8300 Expansion Frame
A customer has two Ethernet Switch Modules installed in an IBM BladeCenter Enterprise chassis. The modules were configured identically. The Ethernet module in bay one was inadvertenly reset to factory defaults. Which solution returns the module to the customer-specific configuration?()A、Back up the configuration from Ethernet module in bay 2 and restore it to the module in Bay 1 using the switch CLI or Web interface B、Swap the modules, which will automatically resynch the settings stored in the Advanced Management Module C、Back up the configuration of the Ethernet module in bay one and restore it to the Ethernet module in bay two using the AMM D、Restore the configuration from NVRAM using the Switch Module Web interface
When a critical error occurs, which module in Enterprise Manager will automatically collect diagnostics data from WebLogic Server?()A、ReportsB、ComplianceC、Support WorkbenchD、Asset DiscoveryE、visual creation of JDBC DataSource object to Oracle RAC
单选题When a critical error occurs, which module in Enterprise Manager will automatically collect diagnostics data from WebLogic Server?()AReportsBComplianceCSupport WorkbenchDAsset DiscoveryEvisual creation of JDBC DataSource object to Oracle RAC
单选题When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()Afor a SAN768B DirectorBfor a second TS3500 Tape LibraryCfor a second EXP5060 Expansion UnitDfor an additional DS8300 Expansion Frame
单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A Routed mode requires the ACE run OSPF or EIGRPB Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
单选题What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()A determine types of protocols to be supportedB determine the environment in which the router will be usedC select the number of WAN ports requiredD select the number of LAN ports required
单选题What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()Adetermine types of protocols to be supportedBdetermine the environment in which the router will be usedCselect the number of WAN ports requiredDselect the number of LAN ports required
单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A It is recommended to place the VPN termination device in line with the Enterprise Edge 1B Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
单选题When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A RFPB RFCC SLC/SLAD SOW
单选题If the default VDC is configured to limit resources to a specific module type, what happens when a module that does not match the resource type is installed?()A The module is powered up, and interfaces are in an admin down state.B The module is denied power, and a syslog message is generated.C The module is powered up, and interfaces are allocated to VDC0.D The module is powered up, and interfaces are allocated to VDC100.
单选题Wh.ch version of spanning tree is recommended for the enterprise campus?()A CSTB MSTC STPD PVST+E PVRST+
单选题Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()A FHRP to remote branches.B Layer 3 MPLS VPNs routing.C Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.D Intrusion prevention, QoS, and stateful firewall support network wide.
单选题When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A Filtering is only useful when combined with route summarizationB It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD The primary limitation of router filtering is that it can only be applied on outbound updates
多选题When designing the IP routing for the Enterprise Campus network, which of these following twoiBGB considerations should be taken into account?()AiBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetworkBiBGP requires a full mesh of eBGP peersCRouters will not advertise iBGP learned routers to other iBGP peers.DThe use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGPEiGBP peers do not add any information to the AS path