多选题When you decide on Campus QoS Design elements, which two statements correctly identify considerations to be taken into account?()AVoice needs to be assigned to the hardware priority queue.BVoice needs to be assigned to the software priority queue.CCall signaling must have guaranteed bandwidth service.DStrict-priority queuing should be limited to 50 percent of the capacity of the link.

多选题
When you decide on Campus QoS Design elements, which two statements correctly identify considerations to be taken into account?()
A

Voice needs to be assigned to the hardware priority queue.

B

Voice needs to be assigned to the software priority queue.

C

Call signaling must have guaranteed bandwidth service.

D

Strict-priority queuing should be limited to 50 percent of the capacity of the link.


参考解析

解析: 暂无解析

相关考题:

You run the SQL Tuning Advisor (STA) to tune a SQL statement that is part of a fixed SQL plan baseline. The STA generates a SQL profile for the SQL statement, which recommends that you accept the profile. Which statement is true when you accept the suggested SQL profile?()A. The tuned plan is not added to the SQL plan baseline.B. The tuned plan is added to the fixed SQL plan baseline as a fixed plan.C. The tuned plan is added to the fixed SQL plan baseline as a nonfixed plan.D. The tuned plan is added to a new nonfixed SQL plan baseline as a nonfixed plan.

In which two situations should you run the command sync group?() (Choose two.) A. when you enable Unified FailoverB. when you create an ActiveN groupC. when you synchronize the sticky tableD. when you require synchronization of the 3G Cache objects

You are the network administrator for . You administer a Windows Server 2003 computer named TestKing7. Users report that they experience poor performance when they access resources located on TestKing7. You suspect a disk bottleneck. You need to set up performance counters to monitor TestKing7.You need to decide which performance objects to monitor.Which two counters should you choose? ()(Each correct answer presents part of the solution. Select two.)A.LogicalDisk\%IdleTimeB.PhysicalDisk\%DiskTimeC.PhysicalDisk\Avg.DiskQueueLengthD.Memory\WriteCopies/secE.Memory\CommitLimit

When you decide on Campus QoS Design elements, which two statements correctly identify considerations to be taken into account?() A. Voice needs to be assigned to the hardware priority queue.B. Voice needs to be assigned to the software priority queue.C. Call signaling must have guaranteed bandwidth service.D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.

When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()A、Layer 2 access link QoS designB、enterprise-to-service-provider mapping modelsC、Layer 3 link access QoS designD、service provider service level agreementsE、Layer 2 link access load balancing

When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

In which two situations should you run the command sync group?() (Choose two.)A、when you enable Unified FailoverB、when you create an ActiveN groupC、when you synchronize the sticky tableD、when you require synchronization of the 3G Cache objects

When an Enterprise Campus network designer is addressing the merger of two companies with different IGPs, which of the following is considering a super routing design?()A、 Eliminate the management and support for redistribution by choosing and cutting over to asingle IGP at the time of mergerB、 Maintain distinct pockets across a moving boundary of routing protocols, redistributing betweenthemC、 Manipulate the administrative distance of the different IGPs to be equal throughout the networkD、 Leave the IGPs independent without redistribution wherever communication between companyentities is not required

Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()A、Voice needs to be assigned to the hardware priority queue.B、Voice needs to be assigned to the software priority queue.C、Call signaling must have guaranteed bandwidth service.D、Strict-priority queuing should be limited to 50 percent of the capacity of the link.E、At least 33 percent of the link bandwidth should be reserved for default best-effort class.

You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

which one of the following database elements is not updated when the design task is run?()A、formsB、viewsC、rolesD、agents

Which two statements are true about record groups?()A、They are stored in the database. B、They are stored in local Forms memory. C、The type is specified explicitly at design time. D、The type is implied by when and how it is created.

You are the network administrator for . You administer a Windows Server 2003 computer named TestKing7. Users report that they experience poor performance when they access resources located on TestKing7. You suspect a disk bottleneck. You need to set up performance counters to monitor TestKing7. You need to decide which performance objects to monitor. Which two counters should you choose? ()(Each correct answer presents part of the solution. Select two.)A、LogicalDisk/%IdleTimeB、PhysicalDisk/%DiskTimeC、PhysicalDisk/Avg.DiskQueueLengthD、Memory/WriteCopies/secE、Memory/CommitLimit

多选题Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()AVoice needs to be assigned to the hardware priority queue.BVoice needs to be assigned to the software priority queue.CCall signaling must have guaranteed bandwidth service.DStrict-priority queuing should be limited to 50 percent of the capacity of the link.EAt least 33 percent of the link bandwidth should be reserved for default best-effort class.

多选题Which two statements correctly identify considerations to take into account when deciding onCampus QoS Design elements? ()AVoice needs to be assigned to the hardware priority queueBVoice needs to be assigned to the software priority queueCCall signaling must have guaranteed bandwidth serviceDStrict-priority queuing should be limited to 50 percent of the capacity of the linkEAt least 33 percent or the link bandwidth should be reserved tor default best effort class

单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A Routed mode requires the ACE run OSPF or EIGRPB Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

问答题Practice 3  For two or three candidates  I’m going to describe a situation.  You are going to look for a job. Talk together about the topics you could include when you decide to look for a particular job. Decide which 3 factors you think are most important.  * three minutes for groups of three candidates  Prompt material  Factors to consider  ●Chance of promotion  ●Salary  ●Responsibilities of post  Follow-up questions:  (1) Is salary the most important thing for you?  (2) Which one do you prefer, a well-paid job that is boring or a low-paid job that you like very much?

问答题Practice 5  For two or three candidates  I’m going to describe a situation.  The retail company you work for is planning to improve its website. Talk together about some of the things that are important for the improvement of the website and decide which 3 you think are most important.  * three minutes for groups of three candidates  Prompt material  ●Contents  ●Design  ●Computer system  ●Personal firewall  Follow-up questions:  (1) Do you think a company’s website is important?  (2) Do you often surf the internet to get some useful information?  (3)What are the advantages for a company to have a website?

多选题You need to store elements in a collection that guarantees that no duplicates are stored. Which two interfaces provide that capability?()AJava.util.MapBJava.util.SetCJava.util.ListDJava.util.StoredSetEJava.util.StoredMapFJava.util.Collection

单选题You need to design the storage of the application texts for UI elements to fulfill the requirements. Which table and column design should you use?()ALanguages (LanguageID, Name)Elements (ElementID, Description)ElementLanguages (ElementID, LanguageID, Text) BLanguages (LanguageID, Name)Elements (ElementID, LanguageID, Description, Text) CLanguages (LanguageID, Name)ElementTexts (LanguageID, Text)ElementDescriptions (ElementID, Description) DLanguages (LanguageID, Name)Elements (ElementID, Description, Text)

多选题When you are troubleshooting duplex mismatches, which two errors are typically seen on the full- duplexend?()AruntsBFCS errorsCinterface resetsDlate collisions

问答题题目要求:  In this part of the test, the examiner reads out a scenario and gives you some prompt material in the form of pictures or words. You have 30 seconds to look at the task prompt, an example of which is below, and then about two minutes to discuss the scenario with your partner. After that, the examiner will ask you more questions related to the topic.Practice 1  For two or three candidates  I’m going to describe a situation.  Your company is going to rent offices. Talk together about the topics you could include when you decide to rent offices. Decide which 3 topics you think are most important.  * three minutes for groups of three candidates  Prompt material  Topics to include  ●Location  ●Cost  ●Transportation  Follow-up questions:  (l) Are facilities important when renting office? (Why? / Why not? )  (2) Do you think security system should be safe? (Why? / Why not? )  (3) Why do big companies also choose big office buildings? (Why? / Why not? )

单选题Which one is the most important based on the following common elements of a network design?()ABusiness needsBRisk analysisCSecurity policyDBest practices

多选题Which two items should you know when configuring OSPF to dynamically learn routes? ()(Choose two.)AOSPF area IDBOSPF neighbor addressCOSPF loopback addressDOSPF authentication type

多选题When you are troubleshooting duplex mismatches, which two errors are typically seen on the fullduplex end?()AruntsBFCS errorsCinterface resetsDlate collisions

多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates