网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests?()
- A、transparent
- B、proxy
- C、reverse proxy
- D、direct
参考答案
更多 “Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests?()A、transparentB、proxyC、reverse proxyD、direct” 相关考题
考题
下列哪个文件若未安装,则配置DNS需要的配置文件都不存在()。A.bind-chroot-9.3.3-7.el5B.caching-nameserver-9.3.3-7.el5C.named.rfc1912.zoneD.named.caching-nameserver.conf
考题
Which two patented or patent-pending compression and caching technologies are used for WX/WXC devices?()(Choose two.)
A. Network Sequence Caching (NSC)B. Molecular Sequence Caching (MSC)C. Network Sequence Reduction (NSR)D. Molecular Sequence Reduction (MSR)
考题
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests?()
A. transparentB. proxyC. reverse proxyD. direct
考题
Which is the most advantageous relationship mode between teachers and students for the development of students?A.Managerial mode.
B.Permissive mode.
C.Arbitrary mode.
D.Democratic mode.
考题
You can install Cisco DCNM-LAN on a supported version of which two operating systems? ()A、 Microsoft Windows ServerB、 Novell SUSE Linux Enterprise ServerC、 Oracle Enterprise LinuxD、 Red Hat Enterprise LinuxE、 VMware ESX
考题
IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()A、IKE keepalives are unidirectional and sent every ten secondsB、IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysC、To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsD、IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
考题
Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
考题
Which two statements about SA caching are true?()A、Caching allows pacing of MSDP messages.B、Caching reduces join latency.C、Caching should not be done by an MSDP speaker.D、Caching is used to update the BGP MDT address family.
考题
Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()A、IPsec tunnelB、GRE tunnelC、Floating stati c routeD、An IGP
考题
Which two table types are CEF components?()A、forwarding information baseB、adjacency tablesC、neighbor tablesD、caching tablesE、route tables
考题
Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabledrouters to intercept user requests?()A、 transparentB、 proxyC、 reverse proxyD、 direct
考题
Which three modes are the operating modes of HDLC? ()A、asynchronous response mode (ARM)B、normal peer mode (NPM)C、asynchronous balanced mode (ABM)D、normal response mode (NRM)E、asynchronous client mode (ACM)
考题
Prioritizing traffic between data and voice is defined as which of the following?()A、Caching enginesB、Proxy serverC、QoSD、Load balancing
考题
You need to identify the combinations of the Windows operating system and SQL Server 2005 version that will be the most appropriate for the new RD configuration, which will include the Research, Parts, and Engineering databases.Which two combinations will be the most appropriate?()A、Windows Server 2003 Enterprise Edition with SQL Server 2005 Enterprise EditionB、Windows Server 2003 Datacenter Edition with SQL Server 2005 Enterprise EditionC、Windows Server 2003 Standard Edition with SQL Server 2005 Enterprise EditionD、Windows Server 2003 Enterprise Edition with SQL Server 2005 Standard Edition
考题
单选题Which of the following files should an administrator modify to configure dynamic caching?()A
dynacache.xmlB
cachespec.xmlC
dynacache.confD
cachemon.xmlE
cachespec.conf
考题
单选题Which setting change would you allow to make a child object to be moved out of a parent object?()A
Flex mode on. B
Flex mode off. C
Confined mode on. D
Confined mode off.
考题
多选题Which two patented or patent-pending compression and caching technologies are used for WX/WXC devices?()(Choose two.)ANetwork Sequence Caching (NSC)BMolecular Sequence Caching (MSC)CNetwork Sequence Reduction (NSR)DMolecular Sequence Reduction (MSR)
考题
单选题Which CLI mode allows you to make configuration changes?()A
enable modeB
configuration modeC
operational modeD
active mode
考题
单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A
Routed mode requires the ACE run OSPF or EIGRPB
Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC
Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD
One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
考题
单选题Which are the two modes for the installation of Windows 2000 professional. ()A
Interactive and Network mode.B
Attended and unattended mode.C
Diskless and floppy mode.D
User level and administrator level mode.
考题
单选题Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabledrouters to intercept user requests?()A
transparentB
proxyC
reverse proxyD
direct
考题
单选题Which of the following includes Active Memory Sharing (AMS)?()A
PowerHA Enterprise EditionB
PowerVM Enterprise EditionC
VMControl Enterprise EditionD
Systems Director Enterprise Edition
考题
多选题Which three modes are the operating of HDLC?()Aasynchronous balanced mode (ABM)Bnormal response mode (NRM)Cnormal peer mode (NPM)Dasynchronous client mode (ACM)Easynchronous response mode (ARM)
考题
多选题Which three modes are the operating modes of HDLC? ()Aasynchronous response mode (ARM)Bnormal peer mode (NPM)Casynchronous balanced mode (ABM)Dnormal response mode (NRM)Easynchronous client mode (ACM)
考题
单选题Which enterprise caching mode eliminates the need for Layer 4 switches or WCCP enabled routers to intercept user requests?()A
transparentB
proxyC
reverse proxyD
direct
考题
多选题Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()AIPsec tunnelBGRE tunnelCFloating stati c routeDAn IGP
考题
多选题You can install Cisco DCNM-LAN on a supported version of which two operating systems? ()AMicrosoft Windows ServerBNovell SUSE Linux Enterprise ServerCOracle Enterprise LinuxDRed Hat Enterprise LinuxEVMware ESX
考题
多选题IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPNstatements are true?()AIKE keepalives are unidirectional and sent every ten secondsBIPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH)protocol for exchanging keysCTo establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only threepacketsDIKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers
热门标签
最新试卷