单选题When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A Active/passive clusterB Active/active clusterC Log shippingD DNS round robin

单选题
When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()
A

 Active/passive cluster

B

 Active/active cluster

C

 Log shipping

D

 DNS round robin


参考解析

解析: 暂无解析

相关考题:

An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router

When load balancing traffic between two web servers,which of the following technologies provides the LOWEST cost solution?() A. Active/passive clusterB. Active/active clusterC. Log shippingD. DNS round robin

Which two traffic classes in a converged network require a OoS model other than the standard FIFO?()A、World Wide Web traffic using load balanced web serversB、voiceC、peer to peer applications mission critical applicationsD、peer to peer applicationsE、multicast routing protocols

It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A、 single layer of firewallingB、 multiple layers of firewallingC、 firewall connections in either an active or standby stateD、 an architecture in which all traffic between firewalls goes through application-specific servers

Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

When configuring a wlan controller for a voice application using cisco 7920 wireless ip phones. which two general control settings should you select?()A、multicast onB、aggressive load balancing offC、multicast offD、ap fallback onE、aggressive load balancing onF、ap fallback off

When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones,which two general control settings should you select?()A、Aggressive Load Balancing onB、Aggressive Load Balancing offC、Multicast onD、Multicast offE、AP Fallback onF、AP Fallback off

An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()A、change the EtherChannel default hashing algorithm from XOR to use source port Layer 4 port load balancing to better load balance the trafficB、change the EtherChannel default hashing algorithm from XOR to use destination Layer 4 port load balancing to better load balance the trafficC、have the application recoded to use multiple connections instead of a single connection so EtherChannel can better load balance the trafficD、upgrade the CPU and memory of the compute devices so they can better process trafficE、upgrade the EtherChannel bundle to a single gigabit link because EtherChannel is not well suited for single-connection traffic

Prioritizing traffic between data and voice is defined as which of the following?()A、Caching enginesB、Proxy serverC、QoSD、Load balancing

An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router

When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A、 Active/passive clusterB、 Active/active clusterC、 Log shippingD、 DNS round robin

Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A、MulticastB、Active/passive clusterC、Active/active clusterD、DNS round robin

Your network contains a Web-based application that runs on Windows Server 2003. You plan to  migrate the Web-based application to Windows Server 2008 R2. You need to recommend a server  configuration to support the Web-based application. The server configuration must meet the following  requirements:   èEnsure that the application is available to all users if a single server?fails èSupport the installation of .NET applications èMinimize software costs  What should you recommend?() A、Install the Server Core installation of Windows Server 2008 R2 Standard on two servers. Configure the servers in a Network Load Balancing cluster.B、Install the full installation of Windows Server 2008 R2 Web on two servers. Configure the servers in a Network Load Balancing cluster.C、Install the full installation of Windows Server 2008 R2 Enterprise on two servers. Configure the servers in a failover cluster.D、Install the full installation of Windows Server 2008 R2 Datacenter on two servers. Configure the servers in a failover cluster.

Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

You deploy a Hyper-V host and you convert the Web servers to VMs. You discover that when users transfer large data files from the Web servers, the CPU utilization of the host exceeds acceptable limits. You need to recommend a solution to reduce the CPU utilization associated to network traffic. The solution must meet the company’s business requirements. What should you recommend implementing?()A、Two network cards that support network adapter teamingB、A network card that supports Virtual Machine ChimneyC、An additional Hyper-V host and Network Load Balancing (NLB)D、An additional Hyper-V host and Failover Clustering

You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()A、To achieve the goal, the Network Load Balancing Clusters console should be opened and a new Allow rule should be created for TCP port 80.B、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rule should be modified to a disabled port range rule.C、To achieve the goal, one of the cluster nodes should be logged on to and the wlbs disable all command should be run.D、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rules should be deleted.

多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

单选题You need to design access to Microsoft Outlook Web Access for remote users. What should you do?()APlace all user mailboxes on back-end servers. Deploy Outlook Web Access on three front-end servers that are members of the Network Load Balancing clusterBPlace all user mailboxes on back-end servers that are members of a Network Load Balancing cluster. Deploy Outlook Web Access on the back-end serversCPlace mailboxes for remote users on one back-end server and place all mailboxes for main office users on another back-end server. Deploy Outlook Web Access on the back-end server that contains the mailboxes for remote usersDPlace all user mailboxes on two back-end servers that are members of a Network Load Balancing cluster. Place mailboxes for remote users and mailboxes for main office users into separate storage groups. Deploy Outlook Web Access on three front-end servers. Configure the front-end servers to access only the back-end Network Load Balancing cluster

单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A Routed mode requires the ACE run OSPF or EIGRPB Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

单选题Your network consists of a single Active Directory domain. All servers run Windows Server 2008 R2.   You plan to publish a Web site on two Web servers.   You need to deploy an availability solution for your Web servers that meets the following requirements: èSupports the addition of more Web servers without interrupting client connections  èEnsures that the Web site is accessible even if a single server fails What should you do?()AConfigure a failover cluster.BConfigure a Web garden on each Web server.CCreate a Network Load Balancing cluster.DCreate two application pools on each Web server.

多选题When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones,which two general control settings should you select?()AMulticast onBAggressive Load Balancing offCMulticast offDAP Fallback onEAggressive Load Balancing onFAP Fallback off

多选题Which two traffic classes in a converged network require a OoS model other than the standard FIFO?()AWorld Wide Web traffic using load balanced web serversBvoiceCpeer to peer applications mission critical applicationsDpeer to peer applicationsEmulticast routing protocols

单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A single layer of firewallingB multiple layers of firewallingC firewall connections in either an active or standby stateD an architecture in which all traffic between firewalls goes through application-specific servers

多选题When configuring a wlan controller for a voice application using cisco 7920 wireless ip phones. which two general control settings should you select?()Amulticast onBaggressive load balancing offCmulticast offDap fallback onEaggressive load balancing onFap fallback off

多选题What are two functions that the parameter max-session performs? ()(Choose two.)ADefines the session limit for the domain.BDefines the session limit for the tunnel instance.CUsed to control load balancing between multiple domains.DUsed to control load balancing between multiple tunnels for a domain.

单选题Which of the following technologies can provide geographically based load balancing with high availability between two web servers with static content?()A MulticastB Active/passive clusterC Active/active clusterD DNS round robin