单选题Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()A use BGP as the CE-PE routing protocolB use OSPF as the CE-PE routing protocolC use EIGRP as the CE-PE routing protocolD use the SP to redistribute routes as external routes for OSPF and EIGRPE use route redistribution at each location to ensure external routes are imported into the IGP
单选题
Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()
A
use BGP as the CE-PE routing protocol
B
use OSPF as the CE-PE routing protocol
C
use EIGRP as the CE-PE routing protocol
D
use the SP to redistribute routes as external routes for OSPF and EIGRP
E
use route redistribution at each location to ensure external routes are imported into the IGP
参考解析
解析:
暂无解析
相关考题:
Which of the following statements describe(s) the properties of a purely segmented memory system?Ⅰ.It divides memory into units of equal sizeⅡ.It permits implementation of virtual memoryⅢ.It suffers from internal fragmentationA.Ⅰ onlyB.Ⅱ onlyC.Ⅲ onlyD.Ⅰand Ⅲ
(b) Calculate the internal rate of return of the proposed investment and comment on your findings. (5 marks)
Please make the implementation as simple as possible. Only help functions and classes fromstandard CC++ may be used to aid your implementation.
How is a Martini Layer 2 MPLS VPN established?() A. established using LDPB. established using BGPC. established using RSVPD. established using IP
You would like to view all Fast Ethernet interfaces currently using VLAN tagging and the specific VLANs each interface is using.Which CLI command displays this information?() A.AB.BC.CD.D
Which of the following statements describe(s)the properties of a purely segmented memory system?(73).Ⅰ. It suffers from internal fragmentationⅡ. It permits implementation of virtual memoryⅢ. It divides memory into units of equal sizeA.Ⅰ onlyB.Ⅲ onlyC.Ⅱ onlyD.Ⅰand Ⅲ
You are developing a verification plan for an upcoming OSPF implementation. Part of this plan is to verify the status of type 3 LSAs within the network. Which routers should you verify first to ensure that the configuration s are correct for generating type 3 LSAs?()A. Internal routers within the backbone area (area 0)B. Internal routers within the NSSAsC. Internal routers within the stubby areasD. ASBRsE. ABRsF. DRs and BDRs
Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?() A. use BGP as the CE-PE routing protocolB. use OSPF as the CE-PE routing protocolC. use EIGRP as the CE-PE routing protocolD. use the SP to redistribute routes as external routes for OSPF and EIGRPE. use route redistribution at each location to ensure external routes are imported into the IGP
Using more than one label on a single packet is required in what context?()A、MPLS TEB、MPLS VPNC、When CEF switching and Label switching is doneD、In all the above circumstances
You are developing a verification plan for an upcoming OSPF implementation. Part of this plan is to verify the status of type 3 LSAs within the network. Which routers should you verify first to ensure that the configuration s are correct for generating type 3 LSAs?()A、Internal routers within the backbone area (area 0)B、Internal routers within the NSSAsC、Internal routers within the stubby areasD、ASBRsE、ABRsF、DRs and BDRs
Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()A、 use BGP as the CE-PE routing protocolB、 use OSPF as the CE-PE routing protocolC、 use EIGRP as the CE-PE routing protocolD、 use the SP to redistribute routes as external routes for OSPF and EIGRPE、 use route redistribution at each location to ensure external routes are imported into the IGP
Which statement about MPLS traffic engineering policy-based tunnel selection (PBTS) is not true?()A、The tunnel that is not configured with the policy-class command acts as the defaultB、EXP selection is between multiple tunnels to the same destinationC、There is no requirement for IGP extensionsD、Tunnels are configured using the policy-class command and carry multiple EXP valuesE、It supports VRF traffic, IP-to-MPLS switching, and MPLS-to-MPLS switching
Which statement correctly describes a situation in which VRFs are used in the data center?()A、Partitioning of network resources is enabled.B、VRFs cannot support path isolation from MAN/WAN designs.C、VRFs cannot be used to map a virtualized data center to a MPLS implementation.D、VRFs do not allow for the use of application services with multiple access topologies.E、An access design using a VRF allows for an aggregation layer service module solution.
A request arrived on your MPLS-vpn-bgp group. Due to a security breach, your customer is experiencing DoS attacks coming from specific subnets (200.0.10.0/24, 200.0.12.0/24). You have checked all MPLS-EBGP routes being advertised to BHK from other VPN sites and found four subnets listed: 200.0.10.0/24, 200.0.11.0/24, 200.0.12.0/24, 200.0.13.0/24. You immediately apply an outbound ACL filter using the appropriate MPLS-EBGP tool: access-list 1 deny 0.0.0.0 255.255.254.255 access-list 1 permit any What happens when you apply this ACL on the MPLS-EBGP connection to BHK?()A、It blocks all routes.B、It blocks the routes 200.0.12.0/24, 200.0.10.0/24 only.C、It blocks the routes 200.0.12.0/24, 200.0.13.0/24 only.D、It blocks the routes 200.0.10.0/24, 200.0.13.0/24 only.E、Nothing happens, no routes are blocked.
Which two statements about Network Attached Storage are correct?()A、Data is accessed using NFS or CIFS.B、Data is accessed at the block level.C、NAS is referred to as captive storage.D、Storage devices can be shared between users.E、A NAS implementation is not as fast as a DAS implementation.
You need to call an unmanaged function from your managed code by using platform invoke services. What should you do?()A、Create a class to hold DLL functions and then create prototype methods by using managed code.B、Register your assembly by using COM and then reference your managed code from COMC、Export a type library for your managed code.D、Import a type library as an assembly and then create instances of COM object.
Your network contains several Windows Server 2008 R2 servers that run Windows Server Update Services (WSUS). The WSUS servers distribute updates to all computers on the internal network. Remote users connect from their personal computers to the internal network by using a split-tunnel VPN connection. You need to plan a strategy for patch management that deploys updates on the remote users coputers. Your strategy must meet the following requirements: èMinimize bandwidth use over the VPN connections. èRequire updates to be approved on the WSUS servers before they are installed on the client computers. What should you include in your plan?()A、Create a Group Policy object (GPO) to perform client-side targeting.B、 Create a computer group for the remote users¯ computers. Configure the remote user computers touse the internal WSUS server.C、Create a custom connection by using the Connection Manager Administration Kit (CMAK). Deploy the custom connection to all of the remote users computersD、Deploy an additional WSUS server. Configure the remote userscomputers to use the additional WSUS server. Configure the additional WSUS server to leave the updates on the Microsoft Update Web site.
You need to design a remote administration solution for servers on the internal network. Your solution must meet business and security requirements. What should you do?()A、Permit administrators to use an HTTP interface to manage servers remotelyB、Permit only administrators to connect to the servers’ Telnet serviceC、Permit administrators to manage the servers by using Microsoft NetMeetingD、Require administrators to use Remote Desktop for Administration connections to manage the servers
You work as an application developer at Certkiller .com. You have recently created a custom collection class named ShoppingList for a local supermarket. This custom class will include ShoppinItem objects that have the public properties listed below. * Name * AisleNumber * OnDiscount You are required to enable users of your class to iterate through the ShoppingList collection, and to list each product name and aisle number using the foreach statement.You need to achieve this by declaring the appropriate code.What code should you use?()A、 public class ShoppingList : ICollection {// Class implementation }B、 public class ShoppingList : IEnumerator, IEnumerable {// Class implementation }C、 public class ShoppingList : Ilist {// Class implementation }D、 public class ShoppingList : Enum {// Class implementation }
单选题Your MPLS implementation is currently using internal backdoor links. What can you do to minimize the impact of having these links?()Ause BGP as the CE-PE routing protocolBuse OSPF as the CE-PE routing protocolCuse EIGRP as the CE-PE routing protocolDuse the SP to redistribute routes as external routes for OSPF and EIGRPEuse route redistribution at each location to ensure external routes are imported into the IGP
单选题In your datawarehousing application, you generate reports frequently. The data is static in the tables being used to generate reports. You are currently using joins, resulting in a large performance overhead. What kind of database structure would you use to reduce the response time of the query?()Ahash clustersBindex clustersCpartitioned tablesDindexorganized table (IOT)
单选题A request arrived on your MPLS-vpn-bgp group. Due to a security breach, your customer is experiencing DoS attacks coming from specific subnets (200.0.10.0/24, 200.0.12.0/24). You have checked all MPLS-EBGP routes being advertised to BHK from other VPN sites and found four subnets listed: 200.0.10.0/24, 200.0.11.0/24, 200.0.12.0/24, 200.0.13.0/24. You immediately apply an outbound ACL filter using the appropriate MPLS-EBGP tool: access-list 1 deny 0.0.0.0 255.255.254.255 access-list 1 permit any What happens when you apply this ACL on the MPLS-EBGP connection to BHK?()AIt blocks all routes.BIt blocks the routes 200.0.12.0/24, 200.0.10.0/24 only.CIt blocks the routes 200.0.12.0/24, 200.0.13.0/24 only.DIt blocks the routes 200.0.10.0/24, 200.0.13.0/24 only.ENothing happens, no routes are blocked.
单选题How is a Martini Layer 2 MPLS VPN established?()Aestablished using LDPBestablished using BGPCestablished using RSVPDestablished using IP
单选题Your network contains several Windows Server 2008 R2 servers that run Windows Server Update Services (WSUS). The WSUS servers distribute updates to all computers on the internal network. Remote users connect from their personal computers to the internal network by using a split-tunnel VPN connection. You need to plan a strategy for patch management that deploys updates on the remote users coputers. Your strategy must meet the following requirements: èMinimize bandwidth use over the VPN connections. èRequire updates to be approved on the WSUS servers before they are installed on the client computers. What should you include in your plan?()ACreate a Group Policy object (GPO) to perform client-side targeting.B Create a computer group for the remote users¯ computers. Configure the remote user computers touse the internal WSUS server.CCreate a custom connection by using the Connection Manager Administration Kit (CMAK). Deploy the custom connection to all of the remote users computersDDeploy an additional WSUS server. Configure the remote userscomputers to use the additional WSUS server. Configure the additional WSUS server to leave the updates on the Microsoft Update Web site.
单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2003 Service Pack 2 (SP2). All client computers run Windows XP Professional Service Pack 3 (SP3). You enable and configure Terminal Server on a server named Server1. A firewall separates Server1 from the internal network. Internal users report that they cannot connect to Server1 by using Remote Desktop Connection. You need to ensure that the users can connect to Server1 by using Remote Desktop Connection. Which port should you open on the firewall? ()A389B3268C3389D5900
多选题You need to design an access control strategy for the external and intranet Web sites. Which two actions should you perform?()AEnable SSL on the external Web site by using a Microsoft cryptographic service provider (CSP)BEnable Microsoft .NET Passport authentication on the external Web site. Use Passport Level 0 with SSL on the external Web siteCEnable SSL on the external Web site by using a commercial digital certificateDEnable SSL on the intranet Web site by using an internal server certificateEEnable SSL on the external Web site by using an internal server certificate
单选题You work as an application developer at Certkiller .com. You have recently created a custom collection class named ShoppingList for a local supermarket. This custom class will include ShoppinItem objects that have the public properties listed below. * Name * AisleNumber * OnDiscount You are required to enable users of your class to iterate through the ShoppingList collection, and to list each product name and aisle number using the foreach statement.You need to achieve this by declaring the appropriate code.What code should you use?()A public class ShoppingList : ICollection {// Class implementation }B public class ShoppingList : IEnumerator, IEnumerable {// Class implementation }C public class ShoppingList : Ilist {// Class implementation }D public class ShoppingList : Enum {// Class implementation }
单选题Your company’s network has client computers that run Windows 7. A software vendor releases version 2 of an application that your company uses. Your company currently uses version 1. Version 1 and version 2 are not compatible. You plan to deploy version 2 of the application. You have the following requirements:Users must be able to run both versions of the application on their computers. Version 2 must be available when a client computer is not connected to the network. You need to plan a software deployment process that meets the requirements. What should you do?()A Deploy version 2 of the application by using Microsoft Application Virtualization (App-V). B Deploy version 2 of the application as a Remote Desktop Services RemoteApp.C Deploy version 2 of the application by using a Group Policy Software Installation policy.D Deploy version 2 of the application by using a Microsoft System Center Configuration Manager package.