网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
When using VSD, traffic flow goes from the virtual machine to which of these?()
A

 Upstream switch

B

 Virtual Supervisor Module

C

 VMware distributed switch

D

 VMware vSwitch

E

 Service virtual machine


参考答案

参考解析
解析: 暂无解析
更多 “单选题When using VSD, traffic flow goes from the virtual machine to which of these?()A  Upstream switchB  Virtual Supervisor ModuleC  VMware distributed switchD  VMware vSwitchE  Service virtual machine” 相关考题
考题 For (71) service, we need a virtual-circuit subnet. Let us see how that works. The idea behind virtual circuits is to avoid having to choose a new (72) for every packet sent. Instead, when a connection is established, a route from the (73)machine to the destination machine is chosen as part of the connection setup and stored in tables inside the (74) That route is used for all traffic flowing over the connection, exactly the same way that the telephone system works. When the connection is released, the virtual circuit is also terminated. With connection-oriented service, each packet carries an (75) telling which virtual circuit it belongs to.A.connectionlessB.connection-orientedC.datagramD.telegram

考题 When does the E-series router start monitoring DHCP traffic using the DHCP External function?() A. When the discovery packet enters the router from the DHCP client.B. Only when the offer packet enters the router from the DHCP server.C. When the acknowledge packet enters the router from the DHCP server.D. Only when the discovery packet leaves the router going to the DHCP server.

考题 Refer to the exhibit. A Boston company bought the asse ts of a New York company and is trying to route traffic between the two data networks using EIGRP over EoMPLS. As a network consultant, you were asked to verify the interoperability of the two networks. From the show ip route command output, what can yo u tell the customer about the traffic flow between the subnet in New York (172.16.8.0/24) and the subnets in Boston (172.16.16.0/24 and 10.10.16.0/24)?()A. Traffic is flowing between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0 and no configuration changes are needed.B. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and subnets 172.16.16.0 and 10.10.16.0.C. Traffic will flow between the 172.16.8.0 subnet and 172.16.16.0 without any further configuration changes. However, auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16.8.0 subnet and the 10.10.16.0 subnet.D. Auto - summary must be disabled on N1 and B1 before traffic can flow between the 172.16 .8.0 subnet and the 172.16.16.0 subnet. However, traffic will flow between the 172.16.8.0 subnet and 10.10.16.0 without any further configuration changes.

考题 Which descriptions of Netflow is correct?()A、By default,Netflow records bidirectional IP traffic flow.B、Netflow answers questions regarding IP traffic:who,what,where,when,and howC、Netflow accounts for both transit traffic and traffic destined for the router.D、Netflow returns the subinterface information in the flow records.

考题 When BGP tuning is used, how is packet flow into the e-commerce module controlled?()A、by tracking the status of objects along the path to the e-commerce moduleB、by detecting undesirable conditions along the path to the e-commerce moduleC、by using the MED to communicate the site preferences for traffic to multiple ISPsD、by communicating the available prefixes, routing policies, and preferences of each site to its ISPE、by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

考题 What are two requirements when using Packet Flow Acceleration? ()(Choose two.)A、Traffic needs be compressed.B、Quality of service must be enabled.C、A service tunnel must exist in at least one direction.D、PFA must be enabled on the client-side WX device.

考题 A network is composed of several VRFs. It is required that VRF users VRF_A and VRF_B be able to route to and from VRF_C,which hosts shared services. However,traffic must not be allowed to flow between VRF_A and VRF_B. How can this be accomplished?()A、route redistributionB、import and export using route descriptorsC、import and export using route targetsD、Cisco MPLS Traffic Engineering

考题 When using VSD, traffic flow goes from the virtual machine to which of these?()A、 Upstream switchB、 Virtual Supervisor ModuleC、 VMware distributed switchD、 VMware vSwitchE、 Service virtual machine

考题 When using a mksysb and base media to clone a system, which of the following will cause the installation to fail()A、mksysb made on a single processor machine but is being installed on a multiple processor machine, no editing of the image.data fileB、mksysb made on machine with mirrored rootvg and new machine only has one disk in rootvg, no editing of the image.data fileC、mksysb made on a machine with 32GB of RAM but being installed on a machine with only 8GB of RAMD、mksysb made on a machine with virtual Ethernet adapter but being installed on a machine which only has a physical Ethernet adapter

考题 When does the E-series router start monitoring DHCP traffic using the DHCP External function?()A、When the discovery packet enters the router from the DHCP client.B、Only when the offer packet enters the router from the DHCP server.C、When the acknowledge packet enters the router from the DHCP server.D、Only when the discovery packet leaves the router going to the DHCP server.

考题 You have a server that runs Windows Server 2008. The server has the Windows Server virtualization role service installed and has one virtual machine. The virtual machine runs Windows Server 2008. You plan to install a new application on the virtual machine.  You need to ensure that you can restore the virtual machine to its original state in the event the application installation fails. What should you do?()A、Log on to the virtual host and enable the Remote Differential Compression Features.B、Log on to the virtual host and enable the Windows Recovery Disk feature.C、From Virtualization Management Console, create a snapshot.D、From Virtualization Management Console, save the state of the virtual machine.

考题 单选题For (1) service, we need a virtual-circuit subnet. Let us see how that works. The idea behind virtual circuits is to avoid having to choose a new (2) for every packet sent. Instead,when a connection is established, a route from the(3) machine to the destination machine is chosen as part of the connection setup and stored in tables inside the (4) . That route is used for all traffic flowing over the connection, exactly the same way that the telephone system works.When the connection is released, the virtual circuit is also terminated. With connection-oriented service, each packet carries an (5) telling which virtual circuit it belongs to. 空白(3)处应选择()A sourceB routeC destinationD host

考题 单选题When using VSD, traffic flow goes from the virtual machine to which of these?()A  Upstream switchB  Virtual Supervisor ModuleC  VMware distributed switchD  VMware vSwitchE  Service virtual machine

考题 单选题When BGP tuning is used, how is packet flow into the e-commerce module controlled?()A by tracking the status of objects along the path to the e-commerce moduleB by detecting undesirable conditions along the path to the e-commerce moduleC by using the MED to communicate the site preferences for traffic to multiple ISPsD by communicating the available prefixes, routing policies, and preferences of each site to its ISPE by moving the SLB to a position where selected traffic to and from the servers does not go through the SLB

考题 填空题Why should you follow the directions carefully when using the machine?To use the washing machine ____.

考题 单选题Companycom will be using Virtual IO Server to share Ethernet adapters. What can be done to prevent network failure of the client if a Virtual IO Server goes down?()A Create two virtual adapters on the client, each one from a separate Virtual IO ServerB Enable dead gateway detection on the client so that the network traffic can be reroutedC Have a spare network card on standby in the client in case the Virtual IO Server goes downD Create an etherchannel adapter on the client using one Virtual Ethernet adapter from two separate Virtual IO Servers

考题 多选题You run a 16-bit scientific data analysis package on your Windows 2000 Professional computer. The package consists of three components. The first component is a data acquisition application that monitors continuous data output from scientific instruments. The second component is a data analysis application that receives data from the data acquisition application by using shared memory. The third component is a data graphing application that displays the processed data in real time.  The data analysis application communicates with the data graphing application by using OLE. When you attempt to analyze large data sets, your computer is not able to display data in real time. You install a second processor in your computer; only one processor is used while the package is running, even though task manager shows both processors.   You want your data analysis package to use both processors. What should you do?()AConfigure the data acquisition application to run in its own virtual DOS machine (VDM).BConfigure the data analysis application to run in its own virtual DOS machine (VDM).CConfigure the data graphing application to run in its own virtual DOS machine (VDM).DConfigure the virtual DOS machine for the data acquisition and data analysis applications to.have a hard affinity for processor 0. Configure the VDM for the data graphing application to.have a hard affinity for processor1.EConfigure the virtual DOS machine for the data acquisition to have a hard affinity for processor 0. Configure the VDM for the data graphing application to have a hard affinity for processor1.

考题 单选题You have a server that runs Windows Server 2008. The server has the Windows Server virtualization role service installed.  You create a new virtual machine and perform an installation of Windows Server 2008 on the virtual machine. You configure the virtual machine to use the physical network card of the host server. You notice that you are unable to access network resources from the virtual machine. You need to ensure that the virtual host can connect to the physical network. What should you do?()A On the host server, install the MS Loopback adapter.B On the host server, enable the Multipath I/O feature.C On the virtual machine, install the MS Loopback adapter.D On the virtual machine, install Windows Server virtualization Guest Integration Components.

考题 多选题Which two statements are true when source/destination filters are enabled? ()(Choose two.)AExcluded traffic is not accelerated.BExcluded traffic is only compressed.CSource/destination filter applies to all traffic sent from LAN to WAN.DSource/destination filters work in packet interception mode using RIPv2.

考题 单选题When does the E-series router start monitoring DHCP traffic using the DHCP External function?()A When the discovery packet enters the router from the DHCP client.B Only when the offer packet enters the router from the DHCP server.C When the acknowledge packet enters the router from the DHCP server.D Only when the discovery packet leaves the router going to the DHCP server.

考题 多选题vPath is a critical component in the VNS architecture. Which two are functions of vPath?()Aintelligent traffic steering to the VSGBoffloading the processing from the VSG to the VEMCintelligent traffic steering to the VNMCDoffloading the processing from the VSG to the flow managerEdeep packet inspection

考题 多选题Which descriptions of Netflow is correct?()ABy default,Netflow records bidirectional IP traffic flow.BNetflow answers questions regarding IP traffic:who,what,where,when,and howCNetflow accounts for both transit traffic and traffic destined for the router.DNetflow returns the subinterface information in the flow records.

考题 单选题Your virtual environment includes Hyper-V host servers and VMware ESX Server hosts. You manage the environment by using Microsoft System Center Virtual Machine Manager (VMM) 2008 R2. You need to enable non-administrative users to manage snapshots or checkpoints for virtual machines (VMs) that are hosted on either host system. What should you do?()A Create checkpoints in VMM.B Create snapshots by using Hyper-V Manager.C Create checkpoints by using the VMM Self-Service Portal.D Create snapshots from within the Virtual Machine Connection console.

考题 单选题You are installing a MAG Series device for access control using an SRX Series device as the firewall enforcer. The MAG Series device resides in the same security zone as users. However, the users reside in different subnets and use the SRX Series device as an IP gateway.Which statement is true?()A You must configure a security policy on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.B No security policy is necessary on the SRX Series device to allow traffic to flow from the user devices to the MAG Series device.C You must configure host-inbound traffic on the SRX Series device to allow SSL traffic between the MAG Series device and the user devices.D You must configure host-inbound traffic on the SRX Series device to allow EAP traffic between the MAG Series device and the user devices.

考题 单选题A vessel when joining or leaving from the side of a traffic separation scheme shall do so at as()to the general direction of traffic flow as practicable.A small an angleB large an angleC either small or large an angleD neither small nor large an angle