To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?() A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC. to two core switches from redundant distribution switches connected with a Layer 2 linkD. to two core switches from redundant distribution switches connected with a Layer 3 linkE. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()

A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link

B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link

C. to two core switches from redundant distribution switches connected with a Layer 2 link

D. to two core switches from redundant distribution switches connected with a Layer 3 link

E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO


相关考题:

Which IGP should you use to achieve scalability in a large enterprise network using Juniperenterprise routers?() A.RIPB.BGPC.OSPFD.EIGRP

You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A. Fast ForwardB. Store and forwardC. Frag-freeD. None of the above

You are the Cisco Network Designer in Cisco.com. Which of these practices should you follow when designing a Layer 3 routing protocol?() A. Never peer on transit links.B. Build squares for deterministic convergence.C. Build inverted U designs for deterministic convergence.D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC、 to two core switches from redundant distribution switches connected with Layer 2 linkD、 to two core switches from redundant distribution switches connected with Layer 3 linkE、 to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A、 Catalyst 2960 SeriesB、 Catalyst 3750 SeriesC、 Catalyst 4900 SeriesD、 Catalyst 6500 Series

You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A、Fast ForwardB、Store and forwardC、Frag-freeD、None of the above

Attaching to a NAS storage system through redundant NICs will provide which of the following?()A、High availability and failoverB、File sharing on the storage systemC、Better bandwidth through NIC Teaming on attached serversD、Greater number of LUNS available on the same storage system

Attaching to a SCSI storage system through redundant paths will provide which of the following?()A、The ability to interleave writes to the arrayB、High Availability and failoverC、LUN sharing via Target Mode SCSI on the storage systemD、A greater number of LUNS available on the same storage system

You are about to design a very fast convergence time on a service provider network. Which feature wouldyou utilize to declare a link failure within less than two seconds of the fault on a link?()A、fast convergence SFPB、MTU discoveryC、redundancy linksD、keepaliveE、carrier delay

ou are the Cisco Network Designer in Cisco.com. Which of these practices should you followwhen designing a Layer 3 routing protocol?()A、 Never peer on transit links.B、 Build squares for deterministic convergence.C、 Build inverted U designs for deterministic convergence.D、 Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。A、Establish a direct link from the switch to all other switches in the network.B、Assign the switch a higher MAC address than the other switches in the network have.C、Configure the switch so that it has a lower priority than other switches in the network.D、Configure the switch for full-duplex operation and configure the other switches for half-duplex operation.E、Connect the switch directly to the MDF router, which will force the switch to assume the role of root bridge.

Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()A、 Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layerB、 Provides host-level redundancy by connecting each end device to 2 separate Access switches C、 Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRPD、 Include a link between two Access switches to support summarization of routing information

You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.

During a planning session, the customer indicates the need to provide high availability between a  Node attached to an IBM TotalStorage Enterprise Storage Server and a remote node attached to a IBM TotalStorage FAStT server with automatic fallover in the event of a disaster.  Which of the following HACMP options will provide this functionality?()  A、 GeoRMB、 HACMP/XD://PPRCC、 HACMP/XD://GPFSD、 HACMP/XD://HAGEO

You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. More than a month ago, the SQL 2005 Server computer is deployed in operation. There are some query performance problems last week. Therefore, you perform an investigation on the locking contention. From the sys.dm_os_wait_stats dynamic management view (DMV), you can see a high value in the max_wait_time_ms column. You want to check out whether this value is a factor which leads to the current performance problems. In addition, the impact on database users should e cut to the least.  Which action should be performed to achieve the goal?()A、To achieve the goal, the UPDATE STATISTICS command should be excuted.B、To achieve the goal, the SQL Server Service should be restarted.C、To achieve the goal, the SQL Server computer should be restarted.D、To achieve the goal, the statistics in the dynamic management view (DMV) should be reset.

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Your company runs Terminal Services. You intend to install an application update for the lobapp.exe application on the Terminal Server. You find instances of the lobapp.exeprocesses left behind by users who have disconnected. In order to make sure that you can perform anapplication update, you have to terminate all instances of the lobapp.exe processes. In order to achievethis,what action should you perform?()A、In order to achieve this,the Tskill lobapp /a command should be run on the Terminal Server.B、In order to achieve this,the Get-Process cmdlet should be run on the Terminal Server.C、In order to achieve this,the Tasklist /fi "IMAGENAME eq lobapp.exe" command should be run on the Terminal Server.D、In order to achieve this,you should end all instances of lobapp.exe in the Terminal Services Manager console.

单选题During a planning session, the customer indicates the need to provide high availability between a  Node attached to an IBM TotalStorage Enterprise Storage Server and a remote node attached to a IBM TotalStorage FAStT server with automatic fallover in the event of a disaster.  Which of the following HACMP options will provide this functionality?()A GeoRMB HACMP/XD://PPRCC HACMP/XD://GPFSD HACMP/XD://HAGEO

单选题Which IGP should you use to achieve scalability in a large enterprise network using Juniperenterprise routers?()ARIPBBGPCOSPFDEIGRP

单选题You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005.You work as a database administrator for your company. Your job is to manage a SQL Server 2005 database, and there are several indexes in the SQL Server 2005. A stored procedure should be written, and the procedure should be utilized to check the indexes for fragmentation.  From the following four Transact-SQL statements, which one should be utilized achieve the goal?()ATo achieve the goal, DBCC DBREINDEX should be utilized.BTo achieve the goal, SELECT * FROM sys.indexes should be utilized.CTo achieve the goal, SELECT * FROM sys.dm_db_index_physical_stats should be utilized.DTo achieve the goal, DBCC INDEXDEFRAG should be utilized.

单选题While designing the database for one of your online transaction processing (OLTP) applications, you want to achieve the following:  a) high availability of data  b) faster primary key access to the table data  c) compact storage for the table  Which type of tables would you use to achieve these objectives?()Aheap tablesBobject tablesCpartitioned tablesDindex­organized tables (IOTs)

单选题Which type of IGP should you use to achieve scalability in a large enterprise network?()Alink-state protocolBpath-vector protocolCBellman-Ford protocolDdistance-vector protocol

单选题You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You are in charge of a member server that runs Windows Server 2008. Theserver runs the Terminal Server Gateway (TS Gateway) role service. Now you receive an order from thecompany management. According to the company requirement, you have to identify whether a user namedUser1 has ever connected to his office workstation through the TS Gateway server. What action should youperform to achieve this?()AIn order to achieve this, you should view the Event Viewer Security log.BIn order to achieve this, you should view the Event Viewer Application log.CIn order to achieve this, you should view the Event Viewer Terminal Services-Gateway log.DIn order to achieve this, you should view the events in the Monitoring folder from the TS Gateway Manager console.

多选题Servers in your environment run Windows Server 2003. You plan to configure a highly available file server. You need to choose the appropriate high-availability technology and the minimum Windows Server 2003 edition for this server.  Which technology and edition should you choose?()Afailover clusteringBNetwork Load BalancingCWindows Server 2003, Standard EditionDWindows Server 2003, Enterprise Edition

单选题You are the Cisco Network Designer in Cisco.com. Which of these practices should you follow when designing a Layer 3 routing protocol?()ANever peer on transit links.BBuild squares for deterministic convergence.CBuild inverted U designs for deterministic convergence.DSummarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

单选题To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC to two core switches from redundant distribution switches connected with Layer 2 linkD to two core switches from redundant distribution switches connected with Layer 3 linkE to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

多选题You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure  it to be installed in a high availability network. On a 3560 EMI switch,  which three types of  interfaces can be used to configure HSRP?()ASVI interfaceBAccess portCEtherChannel port channelDLoopback interfaceERouted portFBVI interface

单选题You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A Catalyst 2960 SeriesB Catalyst 3750 SeriesC Catalyst 4900 SeriesD Catalyst 6500 Series