You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A. Fast ForwardB. Store and forwardC. Frag-freeD. None of the above

You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()

A. Fast Forward

B. Store and forward

C. Frag-free

D. None of the above


相关考题:

You wish to segment your LAN into multiple broadcast domains. Which technology method should you implement in order to do this?A. Transparent bridgingB. Cut-through switchingC. Fragment-free switchesD. Virtual LANsE. Store-and-forward switchingF. None of the above

Which interface commands would you enter on a Catalyst 2900 switch, if your goal was to bring all VLAN traffic to another directly connected switch?() A. Switch(config-if)# vlan allB. Switch(config-if)# switchport trunk encapsulation dot1qC. Switch(config-if)# switchport access vlan allD. Switch(config-if)# switchport mode trunkE. Switch(config-if)# switchport access vlan 303

You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method.When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()A. Switch(config)# switchport trunk encapsulation islB. Switch(config)# switchport trunk encapsulation ietfC. Switch(config-if)# switchport trunk encapsulation islD. Switch(config-if)# switchport trunk encapsulation ietfE. Switch(config-if)# switchport trunk encapsulation dot1q

You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A、 Catalyst 2960 SeriesB、 Catalyst 3750 SeriesC、 Catalyst 4900 SeriesD、 Catalyst 6500 Series

You wish to segment your LAN into multiple broadcast domains. Which technology method should you implement in order to do this?()A、Transparent bridgingB、Cut-through switchingC、Fragment-free switchesD、Virtual LANsE、Store-and-forward switching

Which interface commands would you enter on a Catalyst 2900 switch, if your goal was to bring all VLAN traffic to another directly connected switch?()A、Switch(config-if)# vlan allB、Switch(config-if)# switchport trunk encapsulation dot1qC、Switch(config-if)# switchport access vlan allD、Switch(config-if)# switchport mode trunkE、Switch(config-if)# switchport access vlan 303

You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()A、Fast ForwardB、Store and forwardC、Frag-freeD、None of the above

You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()A、Switch(config)# switchport trunk encapsulation islB、Switch(config)# switchport trunk encapsulation ietfC、Switch(config-if)# switchport trunk encapsulation islD、Switch(config-if)# switchport trunk encapsulation ietfE、Switch(config-if)# switchport trunk encapsulation dot1q

You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()A、Implement a Cisco Secure IPS sensor.B、Implement 802.1X on the switch ports.C、Take no action, you have achieved your goal.D、Implement a protected port on the access switches.

You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()A、The switch name must match the workgroup name of the local network.B、The switch must be configured with an IP address and default gateway.C、The remote workstations must have access to the management VLAN of the switch.D、CDP must be enabled on the switch so that it can be located by other devices on the network.

You have a use case in your web application that adds several session-scoped attributes. At the end of theuse case, one of these objects, the manager attribute, is removed and then it needs to decide which of theother session-scoped attributes to remove. How can this goal be accomplished?()A、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the removeAttribute method on the appropriate session attributes.B、The object of the manager attribute should implement the HttpSessionListener and it should call the removeAttribute method on the appropriate session attributes.C、The object of the manager attribute should implement the HttpSessionBindingListener and it should call the deleteAttribute method on the appropriate session attributes.D、The object of the manager attribute should implement the HttpSessionListener and it should call the deleteAttribute method on the appropriate session attributes.

You want to create a filter for your web application and your filter will implement javax.servlet.Filter. Which two statements are true?()A、Your filter class must implement an init method and a destroy method.B、Your filter class must also implement javax.servlet.FilterChain.C、When your filter chains to the next filter, it should pass the same arguments it received in its doFiltermethod.D、The method that your filter invokes on the object it received that implements javax.servlet.FilterChaincan invoke either another filter or a servlet.E、Your filter class must implement a doFilter method that takes, among other things, anHTTPServletRequest object and an HTTPServletResponse object.

You create two resource plans, one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity.How would you achieve this?()A、Implement job classesB、Implement Scheduler windowsC、Implement the mapping rule for the consumer groupsD、Set the SWITCH_TIME resource plan directive for both the resource plans

You want to migrate your existing non-ASM files to ASM files for the database PROD. Which method  or command would you use to accomplish this task?()A、the CONVERT command of RMANB、Data Pump Export and Import into the same databaseC、conventional export and import into the same databaseD、the BACKUP DATABASE and RESTORE DATABASE commands of RMANE、the BACKUP AS COPY DATABASE and SWITCH DATABASE TO COPY command of RMAN

单选题You are bringing up a new Cisco Catalyst switch, and wish to connect it via a trunk to another switch from a different vendor, which uses the IEEE standard for the trunking method. When setting the encapsulation type on the trunk, what should you configure on the Cisco switch?()ASwitch(config)# switchport trunk encapsulation islBSwitch(config)# switchport trunk encapsulation ietfCSwitch(config-if)# switchport trunk encapsulation islDSwitch(config-if)# switchport trunk encapsulation ietfESwitch(config-if)# switchport trunk encapsulation dot1q

多选题You are configuring a new Catalyst switch that you want to manage remotely from workstations on other network segments within your enterprise.Which of the following are required to allow remote management of the switch over IP?()AThe switch name must match the workgroup name of the local network.BThe switch must be configured with an IP address and default gateway.CThe remote workstations must have access to the management VLAN of the switch.DCDP must be enabled on the switch so that it can be located by other devices on the network.

单选题Your web application requires the adding and deleting of many session attributes during a complex usecase. A bug report has come in that indicates that an important session attribute is being deleted too soonand a NullPointerException is being thrown several interactions after the fact. You have decided to create asession event listener that will log when attributes are being deleted so you can track down when theattribute is erroneously being deleted. Which listener class will accomplish this debugging goal?()ACreate an HttpSessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getName method on the event object.BCreate an HttpSessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getName method on the event object.CCreate an SessionAttributeListener class and implement the attributeRemoved method and log the attribute name using the getAttributeName method on the event object.DCreate an SessionAttributeListener class and implement the attributeDeleted method and log the attribute name using the getAttributeName method on the event object.

单选题In your web application,you need to execute a block of code whenever the session object is first created. Which design will accomplish this goal?()ACreate an HttpSessionListener class and implement the sessionInitialized method with that block ofcode.BCreate an HttpSessionActivationListener class and implement the sessionCreated method with thatblock of code.CCreate a Filter class, call the getSession(false) method, and if the result was null, then execute that block of code.DCreate an HttpSessionListener class and implement the sessionCreated method with that block of code.

单选题You wish to segment your LAN into multiple broadcast domains. Which technology method should you implement in order to do this?()ATransparent bridgingBCut-through switchingCFragment-free switchesDVirtual LANsEStore-and-forward switching

多选题You want to migrate your existing non-ASM files to ASM files for the database PROD. Which method  or command would you use to accomplish this task?()Athe CONVERT command of RMANBData Pump Export and Import into the same databaseCconventional export and import into the same databaseDthe BACKUP DATABASE and RESTORE DATABASE commands of RMANEthe BACKUP AS COPY DATABASE and SWITCH DATABASE TO COPY command of RMAN

多选题You want to migrate your existing non/x7fASM files to ASM files for the database PROD. Which method or command would you use to accomplish this task?()Athe CONVERT command of RMANBData Pump Export and Import into the same databaseCconventional export and import into the same databaseDthe BACKUP DATABASE and RESTORE DATABASE commands of RMANEthe BACKUP AS COPY DATABASE and SWITCH DATABASE TO COPY command of RMAN

多选题You want to create a filter for your web application and your filter will implement javax.servlet.Filter. Which two statements are true?()AYour filter class must implement an init method and a destroy method.BYour filter class must also implement javax.servlet.FilterChain.CWhen your filter chains to the next filter, it should pass the same arguments it received in its doFiltermethod.DThe method that your filter invokes on the object it received that implements javax.servlet.FilterChaincan invoke either another filter or a servlet.EYour filter class must implement a doFilter method that takes, among other things, anHTTPServletRequest object and an HTTPServletResponse object.

多选题The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch, there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing?()Asource IP addressBdestination IP addressCper-packet load balanceDdestination MAC addressEsource MAC address

单选题The correct method of switching off a marine radar is to turn power switch to()position first,then to()position.Aoff/standbyBstandby/offCstandby/closeDclose/standby

单选题You want to implement IP address to Computer Name resolving on your Windows 2000 network. How do you configure this in a NETBIOS environment?()AInstall a DHCP ServerBInstall a DNS ServerCInstall a WINS ServerDInstall an LMHOST Converter

单选题You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()A Catalyst 2960 SeriesB Catalyst 3750 SeriesC Catalyst 4900 SeriesD Catalyst 6500 Series

单选题You create two resource plans,one for data warehouse loading jobs at night and the other for application jobs at day time. You want the resource plans to activate automatically so that the resource allocation is optimum as desired by the activity.  How would you achieve this?()A Implement job classesB Implement Scheduler windowsC Implement the mapping rule for the consumer groupsD Set the SWITCH_TIME resource plan directive for both the resource plans