单选题Which of the following regulates the amount of network traffic a single node receives in a servercluster?()ALoad balancerBProxy serverCContent filterDQuality of service
单选题
Which of the following regulates the amount of network traffic a single node receives in a servercluster?()
A
Load balancer
B
Proxy server
C
Content filter
D
Quality of service
参考解析
解析:
暂无解析
相关考题:
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A.WormB.SmurfC.Logic BombD.Man-in-the-middle
Which of the following devices will allow a technician to measure the amount of data that is capable of traversing the network?() A. Event logsB. Throughput testerC. Packet sniffersD. OTDR
Which of the following regulates the amount of network traffic a single node receives in a servercluster?() A. Load balancerB. Proxy serverC. Content filterD. Quality of service
Which of the following network hardware allows the MOST network traffic collisions?() A.WAPB.HubC.SwitchD.Router
Which of the following is true regarding the use of switches and hubs for network connectivity()。 A.Switches take less time to process frames than hubs take.B.Switches do not forward broadcasts.C.Hubs can filter frames.D.Using hubs can increase the amount of bandwidth available to hosts.E.Switches increase the number of collision domains in the network.
Which three best describe the customer benefits of the Cisco Lifecycle Services approach?()A、improve the skill sets of its staff membersB、increase the value of and return on investment for its networksC、increase network staff productivityD、increase the amount of server room rack spaceE、improve network availability, resiliency, security, and scalabilityF、increase the amount of time required to integrate network changes
Which of the following contribute to congestion on an Ethernet network?()A、Use of full duplex mode.B、Creation of new collision domain.C、Creation of new broadcast domain.D、Addition of hub to the network.E、Use of switches in the network.F、Amount of ARP or IPX SAP traffic.
Which three of the following basic network services are provided by the Cisco IOS?()A、Defines the network topologyB、Access to network resourcesC、Routing and switching functionsD、Content FilteringE、Intrusion Detection
Which of the following network hardware allows the MOST network traffic collisions?()A、WAPB、HubC、SwitchD、Router
Which of the following media types can hold the GREATEST amount of data?()A、 DVDB、 SDLTC、 LTOD、 Blu-Ray
A customer needs the ability to recover their data if a total system failure occurs. Which two of the following are the most important considerations in determining the solution?()A、Network utilizationB、Total amount of storage installedC、Amount of open files in the backupD、Amount of critical data in the backup or restore
Which of the following Class A networks is reserved for "private networks" use only?()A、network 10.0.0.0B、network 127.0.0.0C、network 129.135.0.0D、network 192.168.0.0
Which of the following Internet connection types has the highest amount of latency?()A、SatelliteB、DSLC、CableD、Fiber
Which of the following devices will allow a technician to measure the amount of data that is capable of traversing the network?()A、Event logsB、Throughput testerC、Packet sniffersD、OTDR
A technician wants to increase the reliability of a DHCP server. Which of the following components should be installed to increase the server’s uptime on the network?()A、 Increase the amount of RAMB、 Use a lower voltage power supplyC、 Add a hardware firewallD、 Install redundant NICs
Bob, a user, reports that his computer is running slower since he viewed an online training presentation. Bob is also receiving an increased amount of spam email. Which of the following is the MOST likely cause of Bob’s issue?()A、VirusB、WormC、Network bandwidthD、Malware
A small amount of spoofed packets are being sent across a network and a large amount of reply packets are being sent back to the network resource. Which of the following BEST describes this security threat?()A、WormB、SmurfC、Logic BombD、Man-in-the-middle
Which of the following tools would allow an administrator to push out a software update to allswitches on the network?()A、Network managementB、Protocol analyzerC、Network monitoringD、System diagnostic
Which of the following network protocols is used to ensure consistent time across network devices on the domain?()A、NTPB、FTPC、RTPD、IGMP
单选题Which of the following is more important in determining the amount of free surface that will be produced?().AThe breath of the tankBThe length of the tankCThe amount of liquid in the tankDThe position of the tank in relation to the center line of the vessel
单选题Which of the following network topologies is MOST likely to affect other devices on the network if there is a problem with one of the devices? ()AMeshBBusCRingDStar
多选题Which three of the following basic network services are provided by the Cisco IOS?()ADefines the network topologyBAccess to network resourcesCRouting and switching functionsDContent FilteringEIntrusion Detection
单选题Which of the following is true regarding the use of switches and hubs for network connectivity()。ASwitches take less time to process frames than hubs take.BSwitches do not forward broadcasts.CHubs can filter frames.DUsing hubs can increase the amount of bandwidth available to hosts.ESwitches increase the number of collision domains in the network.
多选题Which three best describe the customer benefits of the Cisco Lifecycle Services approach?()Aimprove the skill sets of its staff membersBincrease the value of and return on investment for its networksCincrease network staff productivityDincrease the amount of server room rack spaceEimprove network availability, resiliency, security, and scalabilityFincrease the amount of time required to integrate network changes
单选题Which of the following defines access for a network?()AACLBRDFCRASDARP