What protection method is used in 4F MS-SPRing networks?()A、 Each fiber has half of its capacity reserved for protection.B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
What protection method is used in 4F MS-SPRing networks?()
- A、 Each fiber has half of its capacity reserved for protection.
- B、 Two fibers carry their full capacities while the other two fibers are reserved for protection.
- C、 The signal is sent simultaneously in both directions around the ring. The receiver determines which fiber to listen to based on signal quality.
- D、 The signal is sent simultaneously in both directions around the ring. The transmitter determines which fiber has the working bit set for the receiver to acknowledge.
相关考题:
According to Paragraph 4, what puzzles the author is that some bosses fail to[A] see the link between trust and data protection.[B] perceive the sensitivity of personal data.[C] realize the high cost of data restoration.[D] appreciate the economic value of trust.
What does the author mainly discuss in the text?A. Technology. B. Sustainability.C. Ethanol energy. D. Environmental protection.
A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?()A、VT circuitsB、STS circuitsC、VT tunnel circuitsD、1:1 protection circuitsE、1:N protection circuits
What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()A、 reports financial losses from attacksB、 providessecutiy command and controlC、 provides VPN connectivity to clientsD、 expedites reporting of incidentsE、 manage rogue wireless signals
What is the correct relative switching priority in a BLSR ring (higher to lower)?()A、signal fail, signal degrade, manual switchB、signal degrade, signal fail, manual switchC、protection lockout, manual switch, path AISD、forced switch, manual switch, signal degradeE、protection lockout, manual switch, forced switch
What are two benefits of control plane policing?()A、protection against denial of service (DoS) attacks at infrastructure routers and switchesB、 protection against known worm attacks in routers and switchesC、quality of service (QoS) control for packets that are sourced from the data plane of Cisco routers and switchesD、quality of service control (QoS) for packets that are destined to the control plane of Cisco routers and switchesE、quality of service (QoS) control for packets that are destined to the data plane of Cisco routers and switches
You need to recommend a backup solution for the VMs that meets the museum's technical requirements. What should you include in the recommendation?()A、On each VM, perform a full server backup by using Windows Server Backup.B、On each physical node, perform a full server backup by using Windows Server Backup.C、Deploy Microsoft System Center Data Protection Manager 2010 and create a new protection group.D、Deploy Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and schedule checkpoints.
信用分析的原则主要有三种,即5W、5C、5P,三原则中对信用保证要求的描述为()。A、what;capacity;paymentB、how;collateral;protectionC、what;collateral;protectionD、how;collateral;protection
A customer has 2 E1s to add between far-end nodes in an SNCP ring. What type of circuit should you recommend? ()A、 LO-PATH circuitsB、 HO-PATH circuitsC、 1:1 protection circuitsD、 1:N protection circuitsE、 LO-TUNNEL tunnel circuits
What is the correct relative switching priority in an MS-SPRing ring (higher to lower)? ()A、 signal fail, signal degrade, manual switchB、 signal degrade, signal fail, manual switchC、 protection lockout, manual switch, path AISD、 forced switch, manual switch, signal degradeE、 protection lockout, manual switch, forced switch
What are two major differences between MS-SPRing and SNCP?()A、 In an MS-SPRing, all paths are protected.B、 MS-SPRing is always a high-order protection.C、 A low order circuit cannot be protected by an MS-SPRing.D、 There is no theoretical limit in the number of nodes in an SNCP ring.
A customer requests a solution that will enhance the availability of their servers and ensure that the time needed to recover from an Operating System fault is at a minimum. What solution do you recommend? ()A、Use RAID protection and add more memoryB、Install Operating System in RAID 0 (Parity) Disk ConfigurationC、Install Operating System in RAID 5 Disk ConfigurationD、Use RAID protection and ensure systems are backed-up daily
You need to recommend a backup strategy for the servers in the San Francisco office. The strategy must meet the company's technical requirements What should you include in the recommendation?()A、native-boot virtual hard disks (VHDs)B、Microsoft System Center Data Protection Manager 2010C、system restore pointsD、Windows Server Backup
You install a new Exchange Server 2010 organization that contains a single server named erver1.Users report that they receive a large number of unsolicited commercial email (UCE) messages.You need to reduce the amount of UCE messages that users in the organization receive.What should you do?()A、Create a journal rule and then create an Outlook Protection RuleB、Create a Transport Protection Rule and then create a journal ruleC、Run the AntispamCommon.ps1 script and then create a Transport Protection RuleD、Run the Install-AntispamAgents.ps1 script and then configure all transport agents
单选题A customer has 2 E1s to add between far-end nodes in an SNCP ring. What type of circuit should you recommend? ()A LO-PATH circuitsB HO-PATH circuitsC 1:1 protection circuitsD 1:N protection circuitsE LO-TUNNEL tunnel circuits
多选题What are two ways in which the Cisco Security Monitoring, Analysis, and Response System provides superior network protection? ()Areports financial losses from attacksBprovidessecutiy command and controlCprovides VPN connectivity to clientsDexpedites reporting of incidentsEmanage rogue wireless signals
单选题What are the Americans concerned about according to the poll?AAge of the children using the Internet.BGovernment protection from the Internet problems.CInformation overload.DThe flow of phone calls, faxes and e-mails.
单选题A customer has 2 DS1s to add between adjacent nodes in a UPSR ring. What type of circuit should you recommend?()AVT circuitsBSTS circuitsCVT tunnel circuitsD1:1 protection circuitsE1:N protection circuits
单选题What is a consequence of installing a Cisco End-to-End Solution?()ADifferent Support Contracts with multiple vendorsBDifficulty implementing network servicesCSolid investment protectionDPoor Investment Protection
单选题What host-based IPS solution provides threat-protection capabilities for server and desktop computing systems?()A Cisco IPS AIMB Cisco IOS IPSC Cisco IPS NMED Cisco Security AgentE Cisco IDSM-2
多选题What are two benefits of the Cisco 1800 Series Integrated Services Routers?()Afixed configuration for secure broadband, metro Ethernet, and wireless connectivityBconfiguration for security policy monitoringCdynamic management through self-healing processesDconnectivity options and investment protection through support for existing Cisco 1700 SeriesWICs
单选题What is the correct relative switching priority in an MS-SPRing ring (higher to lower)? ()A signal fail, signal degrade, manual switchB signal degrade, signal fail, manual switchC protection lockout, manual switch, path AISD forced switch, manual switch, signal degradeE protection lockout, manual switch, forced switch
单选题You need to recommend a backup solution for the file servers that supports the company's planned changes. What should you include in the recommendation?()AFile Server Resource Manager (FSRM)BMicrosoft System Center Data Protection ManagerCWindows Server BackupDWindows Storage Server 2008
单选题You need to recommend a backup solution for the VMs that meets the museum's technical requirements. What should you include in the recommendation?()AOn each VM, perform a full server backup by using Windows Server Backup.BOn each physical node, perform a full server backup by using Windows Server Backup.CDeploy Microsoft System Center Data Protection Manager 2010 and create a new protection group.DDeploy Microsoft System Center Virtual Machine Manager (VMM) 2008 R2 and schedule checkpoints.