多选题Which three statements best describe HSRP configuration on Cisco Nexus switches?()AIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.BIn a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.CYou can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.DYou can use the show standby command to verify HSRP operation and configuration.EIf you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

多选题
Which three statements best describe HSRP configuration on Cisco Nexus switches?()
A

In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.

B

In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.

C

You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.

D

You can use the show standby command to verify HSRP operation and configuration.

E

If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.


参考解析

解析: 暂无解析

相关考题:

Which three statements are true regarding the candidate configuration?() A. The candidate configuration is a temporary configuration that might become the active configuration.B. A candidate configuration is initially populated with the configuration currently active on the system.C. Changes to the candidate configuration take effect immediately.D. The candidate configuration becomes the active configuration after a system reboot.E. The configure private command allows concurrent editing of a candidate configuration by multiple users.

Which three statements describe the User Datagram Protocol (UDP)?() A.UDP provides delivery notification and error checking mechanisms.B.UDP is faster than the Transmission Control Protocol (TCP).C.UDP application examples include DNS and VoIP.D.UDP is an application layer protocol.E.UDP uses a best effort delivery approach.

An ATM PVC is configured as atm pvc 1 0 101 aal5snap 256 128 100 .Which three statements describe the traffic management characteristics of this interface?() A.AB.BC.CD.DE.E

Which two of these statements best describe the benefits of WPAv2? (Choose two.)()A、 SSID broadcast preventionB、 man-in-the-middle attack protectionC、 cost reduction through software upgrades in all existing hardwareD、 dynamic key generationE、 RF jamming prevention

Which three statements about HSRP operation are true?()A、The virtual IP address and virtual MA+K44C address are active on the HSRP Master router.B、The HSRP default timers are a 3 second hello interval and a 10 second dead interval.C、HSRP supports only clear-text authentication.D、The HSRP virtual IP address must be on a different subnet than the routers' interfaces on the same LAN.E、The HSRP virtual IP address must be the same as one of the router's interface addresses on the LAN.F、HSRP supports up to 255 groups per interface, enabling an administrative form of load balancing.

HSRP has been configured between two Company devices.  Which of the following describe  reasons for deploying HSRP? ()A、 HSRP provides redundancy and fault toleranceB、 HSRP allows one router to automatically assume the function of the second router if the second  router failsC、 HSRP allows one router to automatically assume the function of the second router if the second  router startsD、 HSRP provides redundancy and load balancing

Which three statements best describe multicast operation on Cisco Nexus switches in a data center?()A、 Cisco NX-OS Software does not support PIM dense mode.B、 The command ip multicast-routing must be enabled in Cisco NX-OS Software before any multicast configuration is possible on the switch.C、 PIM CLI configuration and verification commands are not available until you enable the PIM feature with the feature pim command.D、 Cisco NX-OS Software supports multicast routing per Layer 3 VRF instance.E、 The default PIM operational mode on the Cisco Nexus 7000 switch is SSM.

Which three statements best describe HSRP configuration on Cisco Nexus switches?()A、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic. No additional configuration is required.B、 In a vPC topology, the primary HSRP router will respond to ARP requests, but both HSRP routers will forward data traffic if the peer-gateway feature is enabled.C、 You can configure two overlapping HSRP groups to load share traffic from the connected hosts while providing the default router redundancy.D、 You can use the show standby command to verify HSRP operation and configuration.E、 If you remove the feature hsrp command, all relevant HSRP configuration information isalso removed.

Which three statements describe the configuration change management feature in DCNM LAN? ()A、 Switch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.B、 DCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.C、 You can archive a maximum of 50 configuration versions per managed device.D、 Managed devices must be licensed in DCNM LAN before they can be used with configuration change management.E、 Device-running configuration will be archived only if it differs from the last archived version.

Which three statements describe the User Datagram Protocol (UDP)?()A、UDP provides delivery notification and error checking mechanisms.B、UDP is faster than the Transmission Control Protocol (TCP).C、UDP application examples include DNS and VoIP.D、UDP is an application layer protocol.E、UDP uses a best effort delivery approach.

Which two of these statements best describe the benefits of WPAv1? ()A、 SSID broadcast preventionB、 Improved mutual authenticationC、 Improved encryption through AESD、 Improved protection against sniffing initialization vectorsE、 RF jamming prevention

You have configured router R1 with HSRP, using the standard defaults.  Which three statements  are true of a default HSRP configuration?()A、 The Standby hello time is 2 seconds.B、 Two HSRP groups are configured.C、 The Standby track interface priority is 10.D、 The Standby hold time is 10 secondsE、 The Standby priority is 100.F、 The Standby delay is 3 seconds.

Which three statements are valid SDM configuration wizards? ()A、NATB、VPNC、STPD、Security Audit

Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)A、includes three design levelsB、incorporates products and technologies into enterprise, service provider, and commercial systemsC、extends the value of designs through a sustained development planD、does not factor customer input design processE、facilitates faster and more reliable customer deploymentsF、incorporates a narrow range of technologies and products

Which two of the following statements are true about HSRP load sharing?() (Choose two)A、It is achieved by using more than one HSRP group.B、It is done in regards to either round robin or weight basis.C、It is used to offload the active router in a certain HSRP group.D、Single group HSRP is used to achieve more efficient link utilization.E、The return traffic is influenced by HSRP load sharing configuration.

Which three statements describe how the strict SQL mode provides added security?()A、It rejects statements that try to insert out-of-range valuesB、It rejects invalid datesC、It limits the operations that the server can performD、It rejects queries that produce out-of-range valuesE、It rejects dates with zero day or month values

多选题Which two of these statements best describe the benefits of WPAv2? (Choose two.)()ASSID broadcast preventionBman-in-the-middle attack protectionCcost reduction through software upgrades in all existing hardwareDdynamic key generationERF jamming prevention

多选题Which three statements describe the configuration change management feature in DCNM LAN? ()ASwitch profiles allow configurations to be synchronized between switches and are supported with any Cisco NX-OS Software managed device.BDCNM LAN can archive configurations from devices even if they are not managed by the DCNM server, and the administrator can supply the device management IP address and credentials.CYou can archive a maximum of 50 configuration versions per managed device.DManaged devices must be licensed in DCNM LAN before they can be used with configuration change management.EDevice-running configuration will be archived only if it differs from the last archived version.

多选题Which three statements are true regarding the candidate configuration?()AThe candidate configuration is a temporary configuration that might become the active configuration.BA candidate configuration is initially populated with the configuration currently active on the system.CChanges to the candidate configuration take effect immediately.DThe candidate configuration becomes the active configuration after a system reboot.EThe configure private command allows concurrent editing of a candidate configuration by multiple users.

多选题Which two statements regarding configuring high availabily in the Cisco UCS is correct?()AHigh availability is enabled during the configuration of either HSRP or VRRP from global configuration modeBHigh availability is configured during the initial setup of both Fabric interconnectsCHigh availability can only be configured via the CMCDHigh availability is enabled during theinitial configuration of one of the Fabric lnterconnects

多选题Which two of these statements best describe the benefits of WPAv1? ()ASSID broadcast preventionBImproved mutual authenticationCImproved encryption through AESDImproved protection against sniffing initialization vectorsERF jamming prevention

多选题Which three statements describe how the strict SQL mode provides added security?()AIt rejects statements that try to insert out-of-range valuesBIt rejects invalid datesCIt limits the operations that the server can performDIt rejects queries that produce out-of-range valuesEIt rejects dates with zero day or month values

多选题You have configured router R1 with HSRP, using the standard defaults.  Which three statements  are true of a default HSRP configuration?()AThe Standby hello time is 2 seconds.BTwo HSRP groups are configured.CThe Standby track interface priority is 10.DThe Standby hold time is 10 secondsEThe Standby priority is 100.FThe Standby delay is 3 seconds.

多选题Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)Aincludes three design levelsBincorporates products and technologies into enterprise, service provider, and commercial systemsCextends the value of designs through a sustained development planDdoes not factor customer input design processEfacilitates faster and more reliable customer deploymentsFincorporates a narrow range of technologies and products

多选题Which three statements describe the User Datagram Protocol (UDP)?()AUDP provides delivery notification and error checking mechanisms.BUDP is faster than the Transmission Control Protocol (TCP).CUDP application examples include DNS and VoIP.DUDP is an application layer protocol.EUDP uses a best effort delivery approach.

多选题Which three statements best describe multicast operation on Cisco Nexus switches in a data center?()ACisco NX-OS Software does not support PIM dense mode.BThe command ip multicast-routing must be enabled in Cisco NX-OS Software before any multicast configuration is possible on the switch.CPIM CLI configuration and verification commands are not available until you enable the PIM feature with the feature pim command.DCisco NX-OS Software supports multicast routing per Layer 3 VRF instance.EThe default PIM operational mode on the Cisco Nexus 7000 switch is SSM.

多选题Which two of the following statements are true about HSRP load sharing?() (Choose two)AIt is achieved by using more than one HSRP group.BIt is done in regards to either round robin or weight basis.CIt is used to offload the active router in a certain HSRP group.DSingle group HSRP is used to achieve more efficient link utilization.EThe return traffic is influenced by HSRP load sharing configuration.