网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
What is the most common cause of network congestion?()
- A、aggregation congestion occurring at the core layer where the different distribution layer devices feed traffic to the core-layer switches
- B、speed mismatches when moving from a low-speed LAN environment to a higher speed WAN environment
- C、flapping Ethernet interfaces caused by misconfigured LAN interfaces
- D、flapping serial interfaces caused by misconfigured WAN interfaces
- E、speed mismatches when moving from a high-speed LAN environment to a lower speed WAN environment
参考答案
更多 “What is the most common cause of network congestion?()A、aggregation congestion occurring at the core layer where the different distribution layer devices feed traffic to the core-layer switchesB、speed mismatches when moving from a low-speed LAN environment to a higher speed WAN environmentC、flapping Ethernet interfaces caused by misconfigured LAN interfacesD、flapping serial interfaces caused by misconfigured WAN interfacesE、speed mismatches when moving from a high-speed LAN environment to a lower speed WAN environment” 相关考题
考题
Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing the overhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()A. Use default Layer 4 hash in core.B. Use default Layer 3 hash in distribution.C. Use default Layer 4 hash in distribution.D. Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
考题
Which of the following is a characteristic of a data center core?()
A. Server-to-server traffic always remains in the core layer.B. The recommended practice is for the core infrastructure to be in Layer 3.C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address and Layer 4 port.E. Core layer should run BGP along with an IGP becauseiBGP has a lower administrative distance than any IGP.
考题
To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()
A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC. to two core switches from redundant distribution switches connected with a Layer 2 linkD. to two core switches from redundant distribution switches connected with a Layer 3 linkE. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
考题
What is a criteria of the enterprise composite network model?()
A. includes all modules needed to meet any network designB. defines flexible boundaries between modules for scalability requirementsC. clearly defines module boundaries and demarcation points to identify where traffic isD. requires specific core, distribution, and access layer requirements to match the model
考题
For what two purposes does the Ethernet protocol use physical addresses?()
A. to uniquely identify devices at Layer 2B. to allow communication with devices on a different networkC. to differentiate a Layer 2 frame from a Layer 3 packetD. to establish a priority system to determine which device gets to transmit firstE. to allow communication between different devices on the same networkF. to allow detection of a remote device when its physical address is unknown
考题
●The network layer provides services to the transport layer.It can be based on either(71).In both cases,its main job is(请作答此空)packets from the source to the destination.In network layer,subnets can easily become congested,increasing the delay and(73)for packets.Network designers attempt to avoid congestion by proper design.Techniques include(74)policy,caching,flow control,and more.The next step beyond just dealing with congestion is to actually try to achieve a promised quality of service.The methods that can be used for this include buffering at the client,traffic shaping,resource(75),and admission control.Approaches that have been designed for good quality of service include integrated services(including RSVP),differentiated services,and MPLS.A.dealing with
B.routing
C.sending
D.receiving
考题
In which two locations in an enterprise network can an IPS sensor be placed?()A、bridging VLANs on two switchesB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunkingE、between a Layer 2 device and a Layer 3 device withtrunking
考题
Which unique characteristics of the Data Center Aggregation layer must be considered by an Enterprise Campus designer?()A、 Layer 3 routing between the Access and Aggregation layers facilities the ability to span VLANsacross multiple access switches, which is a requirement for many server virtualization andclustering technologies.B、 “East-west” server-to-server traffic can travel between aggregation modules by way of the core,but backup and replication traffic typically remains within an aggregation module.C、 Load balancing, firewall service, and other network service are commonly integrated by the useof service modules that are inserted in the aggregation switched.D、 Virtualization tools allow a cost effective approach for redundancy in the network design byusing two or four VDCs from the same physical switch.
考题
A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable, where are the two optimal locations for trust boundaries to be configured by the network administrator?()A、hostB、IP phoneC、access layer switchD、distribution layer switchE、core layer switch
考题
Which of these recommendations is most appropriate for the core layer in the Cisco Campus Architecture?()A、 Utilize Layer 3 switchingB、 Utilize software accelerated servicesC、 Aggregate end users and support a feature-rich environmentD、 Perform packet manipulation and filtering at the core layerE、 Use redundant point to-point Layer 2 interconnections when where is a link or node failure.
考题
To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB、 to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC、 to two core switches from redundant distribution switches connected with Layer 2 linkD、 to two core switches from redundant distribution switches connected with Layer 3 linkE、 to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
考题
You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?()A、routing issueB、denial-of-service attackC、MAC floodingD、spanning-tree recalculationE、Layer 2 loopF、ARP spoofing attack
考题
You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
考题
Distribution layer: This layer includes LAN-based routers and layer 3 switches . When is a first-hop redundancy protocol needed in the distribution layer?()A、OSPF is not supported by the designB、HSRP is not supported by the designC、preempt tuning of the default gateway is neededD、the design implements Layer 3 between the access switch and the distribution switch
考题
What is a criteria of the enterprise composite network model?()A、 includes all modules needed to meet any network designB、 defines flexible boundaries between modules for scalability requirementsC、 clearly defines module boundaries and demarcation points to identify where traffic isD、 requires specific core, distribution, and access layer requirements to match the model
考题
Which three practices are important to the implementation of a DiffServ QoS architecture?()A、 Because services are allocated throughout the network before the transmission of data begins, traffic classes can be guaranteed QoS services.B、 Traffic classes are marked with Layer 2 markings to allow for more granularity in identifying traffic classes.C、 Traffic classes are marked with Layer 3 markings to allow them to traverse different network types without loss of QoS information.D、 Traffic classes allow networks to provide proper QoS treatment of packets without applications having to request services.E、 Based upon the network capabilities, QoS markings are placed on packets as needed throughout the network to allow for proper QoS treatment of packets.F、 QoS markings are placed on packets as close to the network edge as possible to allow distribution and core devices to determine QoS actions as quickly as possible.
考题
For what two purposes does the Ethernet protocol use physical addresses?()A、to uniquely identify devices at Layer 2B、to allow communication with devices on a different networkC、to differentiate a Layer 2 frame from a Layer 3 packetD、to establish a priority system to determine which device gets to transmit firstE、to allow communication between different devices on the same networkF、to allow detection of a remote device when its physical address is unknown
考题
In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking
考题
When is a first-hop redundancy protocol needed in the distribution layer?()A、 when the design implements Layer 2 between the access arid distribution blocksB、 when multiple vendor devices need to be supportedC、 when preempt tuning of the default gateway is neededD、 when a robust method of backing up the default gateway is neededE、 when the design implements Layer 2 between the access switch and the distribution blocksF、 when the design implements Layer 2 between the access and distribution blocks
考题
What are three benefits of class of service?()A、It can make a slow network faster.B、It can prioritize latency-sensitive traffic.C、It can eliminate congestion.D、It can control congestion.E、It can allocate bandwidth for different classes of traffic.
考题
多选题You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()AThe access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tagBNo traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreCTraffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsDIP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offEMAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerFThe distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped
考题
单选题When is a first-hop redundancy protocol needed in the distribution layer?()A
when the design implements Layer 2 between the access arid distribution blocksB
when multiple vendor devices need to be supportedC
when preempt tuning of the default gateway is neededD
when a robust method of backing up the default gateway is neededE
when the design implements Layer 2 between the access switch and the distribution blocksF
when the design implements Layer 2 between the access and distribution blocks
考题
单选题To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()A
to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 linkB
to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 linkC
to two core switches from redundant distribution switches connected with a Layer 2 linkD
to two core switches from redundant distribution switches connected with a Layer 3 linkE
to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
考题
单选题Cisco Express Forwarding (CEF) is mainly used to increase packet switching speed, reducing theoverhead and delays introduced by other routing techniques, increasing overall performance.Which of the following concerning CEF is recommended by Cisco?()A
Use default Layer 4 hash in core.B
Use default Layer 3 hash in distribution.C
Use default Layer 4 hash in distribution.D
Use default Layer 3 hash in core and Layer 3 + Layer 4 hash in distribution layer.
考题
单选题What is the most common cause of network congestion?()A
aggregation congestion occurring at the core layer where the different distribution layer devices feed traffic to the core-layer switchesB
speed mismatches when moving from a low-speed LAN environment to a higher speed WAN environmentC
flapping Ethernet interfaces caused by misconfigured LAN interfacesD
flapping serial interfaces caused by misconfigured WAN interfacesE
speed mismatches when moving from a high-speed LAN environment to a lower speed WAN environment
考题
单选题What is a criteria of the enterprise composite network model?()A
includes all modules needed to meet any network designB
defines flexible boundaries between modules for scalability requirementsC
clearly defines module boundaries and demarcation points to identify where traffic isD
requires specific core, distribution, and access layer requirements to match the model
考题
多选题What are three benefits of class of service?()AIt can make a slow network faster.BIt can prioritize latency-sensitive traffic.CIt can eliminate congestion.DIt can control congestion.EIt can allocate bandwidth for different classes of traffic.
热门标签
最新试卷