单选题There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()A9 LCCsB7 LCCsC10 LCCsD6 LCCsE8 LCCs

单选题
There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()
A

9 LCCs

B

7 LCCs

C

10 LCCs

D

6 LCCs

E

8 LCCs


参考解析

解析: 暂无解析

相关考题:

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface

In which two situations should you run the command sync group?() (Choose two.) A. when you enable Unified FailoverB. when you create an ActiveN groupC. when you synchronize the sticky tableD. when you require synchronization of the 3G Cache objects

Which two benefits does the Juniper DX provide?() (Choose two.) A. It compresses all images.B. It protects servers from DDoS attacks.C. It protects servers from SynFlood attacks.D. It loads all content from web servers to flash.

Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.) A. rate limiting of ICMPB. RADIUS authorizationsC. source address validationD. stateful firewall on the router

Which two items should you know when configuring OSPF to dynamically learn routes? ()(Choose two.) A. OSPF area IDB. OSPF neighbor addressC. OSPF loopback addressD. OSPF authentication type

What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)A、It protects signals against node failures between rings.B、It protects signals against node failure within a single ring.C、It allows for traffic to be preempted when a ring switch occurs.D、Traffic can be dropped and continued at interconnecting nodes.E、It protects preemptible traffic from being dropped when a ring switch occurs.

In which two situations should you run the command sync group?() (Choose two.)A、when you enable Unified FailoverB、when you create an ActiveN groupC、when you synchronize the sticky tableD、when you require synchronization of the 3G Cache objects

Which two benefits does the Juniper DX provide?() (Choose two.)A、It compresses all images.B、It protects servers from DDoS attacks.C、It protects servers from SynFlood attacks.D、It loads all content from web servers to flash.

There are two cabling schemes to choose from when implementing a Cisco CRS-1 multishelf system:single-module cabling and multimodule cabling. What is the maximum capacity of the LCCs that aresupported in multimodule cabling?()A、9 LCCsB、7 LCCsC、10 LCCsD、6 LCCsE、8 LCCs

Under which two circumstances would an RSTP bridge flush its CAM table?()A、upon a port state changeB、upon receiving a topology change notificationC、when transitioning from discarding to forwardingD、when transitioning from forwarding to discardingE、only when changing from listening to discardingF、when CAM resources have been completely used up

What are two reasons a network administrator would use CDP (Choose two.)()。A、to verify the type of cable interconnecting two devicesB、to determine the status of network services on a remote deviceC、to obtain VLAN information from directly connected switchesD、to verify Layer 2 connectivity between two devices when Layer 3 failsE、to obtain the IP address of a connected device in order to telnet to the deviceF、to determine the status of the routing protocols between directly connected routers

Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface

Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?()A、 Coherence uses a more efficient TCMP algorithm going from two to four cache serversB、 When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of workC、 Near cache is enabled with a larger quorum thus performance is improvedD、 all of the above

多选题Which two features protect the ERX Edge Router from denial-of-service attacks? ()(Choose two.)Arate limiting of ICMPBRADIUS authorizationsCsource address validationDstateful firewall on the router

多选题Which two types of optimization does the WX 60 device perform when Exchange 2003 and Outlook 2003 areused in the network? ()(Choose two.)APacket Flow AccelerationBNetwork Sequence CachingCAppFlow's MAPI accelerationDMolecular Sequence Reduction

单选题When scaling Coherence from one to two cache servers, it will not show the same scalability as two to four. Why?()A Coherence uses a more efficient TCMP algorithm going from two to four cache serversB When going from one to two cache servers, object backups are copied across servers so work is doubled,but going from two to four is a fixed amount of workC Near cache is enabled with a larger quorum thus performance is improvedD all of the above

多选题Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)Aalways for LNSBalways for LACCLAC with fragmentation in the tunnelDLNS when there are greater than 2000 sessions

多选题What are two characteristics of dual-ring interconnect in SONET networks? ()(Choose two.)AIt protects signals against node failures between rings.BIt protects signals against node failure within a single ring.CIt allows for traffic to be preempted when a ring switch occurs.DTraffic can be dropped and continued at interconnecting nodes.EIt protects preemptible traffic from being dropped when a ring switch occurs.

多选题Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)Aregular upgrade processBmultivendor supportCcost savingsDproduct varietyEwell-tested interoperability

多选题Which two benefits does the Juniper DX provide?() (Choose two.)AIt compresses all images.BIt protects servers from DDoS attacks.CIt protects servers from SynFlood attacks.DIt loads all content from web servers to flash.

多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destination filters work in packet interception mode using RIPv2.

多选题What are two reasons a network administrator would use CDP (Choose two.)()。Ato verify the type of cable interconnecting two devicesBto determine the status of network services on a remote deviceCto obtain VLAN information from directly connected switchesDto verify Layer 2 connectivity between two devices when Layer 3 failsEto obtain the IP address of a connected device in order to telnet to the deviceFto determine the status of the routing protocols between directly connected routers

多选题What are two important approaches to communicate when identifying a customer’s security risks? (Choose two.) ()ASmaller companies are at less risk than larger enterprises, so their security needs are not as great.BBusiness strategy should directly relate to the security policy and budget.CThe designated security expert should report to the IT department, since that is where thesolution will be implemented.DSecurity should be a continuous process.ESecurity solutions should come from multiple vendors to make it easier to coordinate security events from the point of origin.

多选题Which two items should you know when configuring OSPF to dynamically learn routes? ()(Choose two.)AOSPF area IDBOSPF neighbor addressCOSPF loopback addressDOSPF authentication type

单选题You should choose a dentist in ______ the same way as you choose a physician, get the names of two or three dentists from friends and relatives and have a preliminary visit with each.AveryBexactCgenerallyDmuch