多选题Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()AHash address: Selects the server by using a hash value based on either the source or destination IP address, or bothBHash URL: Selects the server by using a hash value based on the requested URLCHash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or bothDHash header: Selects the server by using a hash value based on the HTTP header nameEHash IP: Selects the server using a hash value based on the IP address

多选题
Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()
A

Hash address: Selects the server by using a hash value based on either the source or destination IP address, or both

B

Hash URL: Selects the server by using a hash value based on the requested URL

C

Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or both

D

Hash header: Selects the server by using a hash value based on the HTTP header name

E

Hash IP: Selects the server using a hash value based on the IP address


参考解析

解析: 暂无解析

相关考题:

The Cisco IOS SLB feature is a Cisco IOS-based solution that provides server load balancing.This feature allows you to define a virtual server that represents a cluster of real servers, known as a server farm.When a client initiates a connection to the virtual server, the IOS SLB load balances the connection to a chosen real server, depending on the configured load balance algorithm or predictor.Which three implementation modes may be used to deploy SLB? ()A. Router modeB. One-arm modeC. Three-arm modeD. Bridge mode inline

What are two characteristics of Server Load Balancing router mode?()A、 The design supports multiple server subnets Cisco 642-874: Practice ExamB、 An end-user sees the IP address of the real serverC、 SLB routes between the outside and inside subnetsD、 The source or destination MAC address is rewritten, but the IP addresses left aloneE、 SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices

What is Phantom RP used for?()A、it is used for load balancing in bidirectional PIMB、it is used for redundancy in bidirectional PIMC、it is used for redundancy in PIM-SMD、it is used for load balancing in PIM-SM

Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

When WebSphere Commerce, WebSphere Application Server, the web server and the database server are all located on a single machine, which of the following statements are TRUE? ()A、this is a multi-node installationB、this is a single node installation.C、each hardware and software component is a single point of failure.D、this is an example of load balancing.

The Cisco IOS SLB feature is a Cisco IOS-based solution that provides server load balancing.This feature allows you to define a virtual server that represents a cluster of real servers, known as a server farm.When a client initiates a connection to the virtual server, the IOS SLB load balances the connection to a chosen real server, depending on the configured load balance algorithm or predictor.Which three implementation modes may be used to deploy SLB? ()A、Router modeB、One-arm modeC、Three-arm modeD、Bridge mode inline

Server load balancing (SLB) is the process of deciding to which server a load-balancing device should send a client request for service. Which predictors are supported on ACE in order to select the best server to fulfill a client request? ()A、 Hash address: Selects the server by using a hash value based on either the source or destination IP address, or bothB、 Hash URL: Selects the server by using a hash value based on the requested URLC、 Hash MAC.Selects the server by using a hash value based on either the source or destination MAC address, or bothD、 Hash header: Selects the server by using a hash value based on the HTTP header nameE、 Hash IP: Selects the server using a hash value based on the IP address

An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()A、change the EtherChannel default hashing algorithm from XOR to use source port Layer 4 port load balancing to better load balance the trafficB、change the EtherChannel default hashing algorithm from XOR to use destination Layer 4 port load balancing to better load balance the trafficC、have the application recoded to use multiple connections instead of a single connection so EtherChannel can better load balance the trafficD、upgrade the CPU and memory of the compute devices so they can better process trafficE、upgrade the EtherChannel bundle to a single gigabit link because EtherChannel is not well suited for single-connection traffic

An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

Which IBM host-based device driver allows for path failover, while also providing dynamic load balancing on a Windows 2000-based server()A、PowerPathB、MPIOC、RDACD、SDD

You are configuring a JMS server with a need for load balancing the messages. To achieve the  load balance you should ().A、use regular queues and topics  B、use distributed queues and topicsC、not use subdeploymentsD、disable server affinityE、use message paging

You have an Exchange Server 2010 organization.  You need to recommend a client access solution that meets the following requirements: .Reduces the time required for users to reconnect to user mailboxes if a single Client Access server fails .Prevents users from being prompted for authentication if a single Client Access server fails What should you recommend?()A、Client Access server array and hardware load-balancerB、database availability group (DAG) and hardware load-balancerC、failover clustering and database availability group (DAG)D、Windows Network Load Balancing and failover clustering

You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

You need to recommend a Windows Server 2008 R2 server configuration that meets the following  requirements:   èSupports the installation of Microsoft SQL Server 2008   èProvides redundancy for SQL services if a single server fails What should you recommend?() A、Install a Server Core installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.B、Install a full installation of Windows Server 2008 R2 Standard on two servers. Configure Network Load Balancing on the two servers.C、Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure Network Load Balancing on the two servers.D、Install a full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.

You have an Exchange Server 2010 organization.  The organization contains two servers named Server1 and Server2.  Server1 and Server2 have the Mailbox server role and the Hub Transport server role installed. Server 1 and Server2 are members of a database availability group (DAG).  You need to plan the deployment of Client Access servers to meet the following requirements: .Users must be able to access their mailboxes if a single server fails .Users must not attempt to connect to a failed server  What should you include in your plan?()A、On Server1 and Server2, install the Client Access server role. Implement failover clustering.B、On Server1 and Server2, install the Client Access server role. Configure network interface card (NIC) teaming on each server.C、Deploy two new Client Access servers. Implement load balancing by using DNS round robin.Create a Client Access server array.D、Deploy two new Client Access servers. Implement load balancing by using a Windows Network Load Balancing cluster. Create a Client Access server array.

You are the network administrator for The network consists of a single Active Directory domain All network servers run Windows Server 2003. Terminal Services is installed on three servers running Windows 2000 Server. Remote users use the terminal servers to access the company intranet so they can read e-mail and submit time sheets. To make a connection, users choose a terminal server from a list. This process generates help desk requests. Over time, the remote user load increases. The existing terminal server cannot support the number of concurrent connections. You need to create a new terminal server to assist in handling the load. However,you must not add any new server names to the list of terminal servers. First, you upgrade all three servers to Windows Server 2003 with Terminal Server installed. What should you do next?()A、Create a Session Directory terminal server farm.B、Configure the Windows Cluster Services on each terminal server.C、Install and configure Network Load Balancing.D、Install and configure round robin DNS.

Your company has an Active Directory domain. All servers in the domain run Windows Server 2008.  The Terminal Services Gateway role service is installed on a server named Server1. The Terminal Services role is installed on two servers named Server2 and Server3. Server2 and Server3 are configured in a load balancing Terminal Server farm named TSLoad. You deploy the Terminal Services (TS) Session Broker service on a new server named Server4. You confirm that the TS Session Broker works correctly.  You deploy a hardware load balancing device to handle the load distribution to the Terminal Server farm. The device has specialized support for terminal servers and routing tokens. You discover that the TS Session Broker no longer works correctly.  You need to ensure that the TS Session Broker works correctly.  Which Group Policy object(GPO)should you create and apply to the Terminal Server farm?()A、A GPO that enables the Use IP Address Redirection policy setting in the Session Directory section of the Terminal Server Group Policy template.B、A GPO that disables the Use IP Address Redirection policy setting in the TS Session Broker section of the Terminal Server Group Policy template.C、A GPO that enables the Use TS Session Broker Load Balancing policy setting in the Session Directory section of the Terminal Server Group Policy template.D、A GPO that disables the Use TS Session Broker Load Balancing policy setting in the Session Directory section of the Terminal Server Group Policy template.

Your network contains two Hyper-V hosts that run Windows Server 2012 R2. The Hyper-V hosts contains several virtual machines that run Windows Server 2012 R2. You install the Network Load Balancing feature on the virtual machines. You need to configure the virtual machines to support Network Load Balancing (NLB). Which virtual machine settings should you configure?()A、Port mirroringB、DHCP guardC、Router guardD、MAC address

多选题You are configuring a JMS server with a need for load balancing the messages. To achieve the  load balance you should ().Ause regular queues and topicsBuse distributed queues and topicsCnot use subdeploymentsDdisable server affinityEuse message paging

单选题You need to design access to Microsoft Outlook Web Access for remote users. What should you do?()APlace all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing clusterBPlace all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end serversCPlace mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote usersDPlace all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster

单选题You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()AConfigure the front-end servers in each branch office to be members of a new Active Directory siteBConfigure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)CConfigure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connectionsDConfigure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A Routed mode requires the ACE run OSPF or EIGRPB Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

单选题Your company has an Active Directory forest named contoso.com.  You plan to deploy an Exchange Server 2010 organization that will contain two servers.  Each server will have the Client Access server role, the Hub Transport server role, and the Mailbox serverrole installed.  You plan to add both servers to a database availability group (DAG).  You need to recommend a high-availability solution for the Client Access server role.  Your solution must ensure that users are not prompted to authenticate if a Client Access server becomesunavailable.  What should you recommend?()ACreate and configure a Client Access server array,and then install a hardware load balancer.BCreate and configure a Client Access server array,and then install Windows Network Load Balancing on both servers.CDeploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then implement DNS round robin.DDeploy Microsoft Internet Security and Acceleration (ISA) Server 2006,and then install Windows Network Load Balancing.

多选题When WebSphere Commerce, WebSphere Application Server, the web server and the database server are all located on a single machine, which of the following statements are TRUE? ()Athis is a multi-node installationBthis is a single node installation.Ceach hardware and software component is a single point of failure.Dthis is an example of load balancing.