网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()
- A、Never use passive interfaces.
- B、Use NSSA areas from the core down.
- C、Use totally stub areas to stop type 3 LSAs.
- D、Use the lowest Ethernet interface IP address as the router ID.
- E、Tune OSPF timers to enable OSPF to achieve quicker convergence.
参考答案
更多 “Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()A、Never use passive interfaces.B、Use NSSA areas from the core down.C、Use totally stub areas to stop type 3 LSAs.D、Use the lowest Ethernet interface IP address as the router ID.E、Tune OSPF timers to enable OSPF to achieve quicker convergence.” 相关考题
考题
Which two design goals describe the Junos OS design?()
A. clean separation of security and routing policiesB. clean separation of control and forwarding planesC. modularization of multiple software processesD. a single hardware platform for all software applications
考题
Which of the following tools can make recommendations for indexes and/or MQTs to improve the performance of DB2 applications?()
A.Design AdvisorB.Visual ExplainC.Performance AdvisorD.Configuration Assistant
考题
Refer to the exhibit. Which two statements about the topologies shown are correct?()
A. Design 1 is a looped triangle design.B. Design 2 is a looped triangle design.C. Design 2 achieves quick convergence using RSTP.D. Both designs supportstateful services at the aggregation layer.E. Design 2 is the most widely deployed in enterprise data centers.
考题
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()
A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks.
考题
Which two design recommendations are most appropriate when EIGRP is the data center core routing protocol?()
A. Summarize data center subnets.B. Use passive interfaces to ensure appropriate adjacencies.C. Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.D. Adjust the default bandwidth value to ensure proper bandwidth on all links.E. Advertise a default summary route into the data center core from the aggregation layer.
考题
Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()
A. peer-to-peerB. partial meshC. hub and spokeD. full mesh
考题
D()is one of the design features of human language which refers to the phenomenon that language consists of two levels: a lower level of meaningless individual sounds and a higher level of meaningful units.
考题
As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design program. Which two of the following descriptions correctly identify its features? ()(Choose two.)A、It strives to protect access to design documentation.B、It facilitates customer deployments that are more predictable.C、It facilitates customer deployments that are less reliable.D、It incorporates products and technologies into a broad portfolio.
考题
Which two WAN access methods are specified for a simplified and cost-effective Cisco Single-Site Secure Network Foundation Deployment Design?()A、Frame-RelayB、Leased LineC、MPLSD、DSLE、CableF、Wireless
考题
In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()A、 a higher fan-out ratioB、 fully redundant switchesC、 100 percent port efficiencyD、 all ISLs contained within a single chassisE、 higher latency and throughput than a core-edge design switch
考题
Which of the following tools can make recommendations for indexes and/or MQTs to improve the performance of DB2 applications?()A、Design AdvisorB、Visual ExplainC、Performance AdvisorD、Configuration Assistant
考题
Which two design goals describe the Junos OS design?()A、clean separation of security and routing policiesB、clean separation of control and forwarding planesC、modularization of multiple software processesD、a single hardware platform for all software applications
考题
Which two statements are true about the Automatic Database Diagnostic Monitor (ADDM)()A、The ADDM requires at least four AWR snapshots for analysis.B、The ADDM runs after each AWR snapshot is collected automatically by MMON.C、The results of the ADDM analysis are stored in the Automatic Workload Repository (AWR).D、The ADDM analysis provides only diagnostic information but does not provide recommendations.E、The ADDM calls other advisors if required, but does not provide recommendations about the advisors.
考题
Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()A、 Summarize data center subnets.B、 Use passive interfaces to ensure appropriate adjacencies.C、 Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.D、 Adjust the default bandwidth value to ensure proper bandwidth on all links.E、 Advertise a default summary route into the data center core from the aggregation layer.
考题
Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()A、 Never use passive interfaces.B、 Use NSSA areas from the core down.C、 Use totally stub areas to stop type 3 LSAs.D、 Use the lowest Ethernet interface IP address as the router ID.E、 Tune OSPF timers to enable OSPF to achieve quicker convergence
考题
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.
考题
Which two of these are advantages of placing the VPN device parallel to the firewall?()A、 high scalabilityB、 the design supports a layered security modelC、 firewall addressing does not need to changeD、 IPsec decrypted traffic is inspected by the firewallE、 there is a centralized point for logging and content inspection
考题
Address translation is another component of Layer 3 design. Which two types of address translation allow an IP Address to be duplicated? ()A、 PATB、 CATC、 NATD、 DATE、 FAT
考题
Which two are characteristics of the Transfer Object design pattern?()A、It reduces network traffic by collapsing multiple remote requests into one.B、It increases the complexity of the remote interface by removing coarse-grained methods.C、It increases the complexity of the design due to remote synchronization and version control issues.D、It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.
考题
填空题D()is one of the design features of human language which refers to the phenomenon that language consists of two levels: a lower level of meaningless individual sounds and a higher level of meaningful units.
考题
多选题The following terms describe various design options for Enterprise connectivity to the Internet.Which of the follow ing imply that the Enterprise connects to two or more ISPs?()ASingle HomedBDual HomedCSingle MultihomedDDual Multihomed
考题
单选题Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()A
peer-to-peerB
partial meshC
hub and spokeD
full mesh
考题
多选题Which two design goals describe the Junos OS design?()Aclean separation of security and routing policiesBclean separation of control and forwarding planesCmodularization of multiple software processesDa single hardware platform for all software applications
考题
单选题A company needs to connect seven of their Windows-based servers to a DS4000 storage server. The DS4000 only has two host-side connections, and each server has two HBAs. Which of the following is the lowest cost solution to provide no single points of failure?()A
Implement two 8-port switches design with ISLsB
Implement two 16-port switches design with ISLsC
Implement two 8-port switches design without ISLsD
Implement two 16-port switches design without ISLs
考题
多选题Address translation is another component of Layer 3 design. Which two types of address translation allow an IP Address to be duplicated? ()APATBCATCNATDDATEFAT
考题
多选题Which two are characteristics of the Transfer Object design pattern?()AIt reduces network traffic by collapsing multiple remote requests into one.BIt increases the complexity of the remote interface by removing coarse-grained methods.CIt increases the complexity of the design due to remote synchronization and version control issues.DIt increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.
考题
多选题In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director? ()Aa higher fan-out ratioBfully redundant switchesC100 percent port efficiencyDall ISLs contained within a single chassisEhigher latency and throughput than a core-edge design switch
考题
多选题As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design program. Which two of the following descriptions correctly identify its features? ()(Choose two.)AIt strives to protect access to design documentation.BIt facilitates customer deployments that are more predictable.CIt facilitates customer deployments that are less reliable.DIt incorporates products and technologies into a broad portfolio.
热门标签
最新试卷