网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

A.full mesh

B.peer-to-peer

C.partial mesh

D.hub and spoke


参考答案

更多 “ You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A.full meshB.peer-to-peerC.partial meshD.hub and spoke ” 相关考题
考题 A network has been developed with resources from six different departments. One of the six departments has just informed you that they can increase the number of employees from to . This will result in:A.A shortening of the critical path.B.A shortening of the noncritical path.C.A decrease in the total cost of the project.D.An increase in the cost of the project.E.A through D are possible based upon where the resources are deployed.

考题 104 A network has been developed with resources from six different departments. One of the six departments has just informed you that they can increase the number of employees from 5 to 8. This will result in:A. A shortening of the critical path.B. A shortening of the noncritical path.C. A decrease in the total cost of the project.D. An increase in the cost of the project.E. A through D are possible based upon where the resources are deployed

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop

考题 You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.255.255.255.252F.255.255.255.254

考题 You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use?()A、255.255.255.192B、255.255.255.224C、255.255.255.240D、255.255.255.248E、255.255.255.252F、255.255.255.254

考题 One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A、 full meshB、 peer-to-peerC、 partial meshD、 hub and spoke

考题 Your network contains a single Active Directory domain that has two sites named Site1 and Site2.   Site1 has two domain controllers named DC1 and DC2. Site2 has two domain controllers named DC3  and DC4.  DC3 fails.   You discover that replication no longer occurs between the sites.   You verify the connectivity between DC4 and the domain controllers in Site1.  On DC4, you run repadmin.exe /kcc.   Replication between the sites continues to fail.   You need to ensure that Active Directory data replicates between the sites.   What should you do()A、From Active Directory Sites and Services, modify the properties of DC3.B、From Active Directory Sites and Services, modify the NTDS Site Settings of Site2.C、From Active Directory Users and Computers, modify the location settings of DC4.D、From Active Directory Users and Computers, modify the delegation settings of DC4.

考题 You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A、 Easy VPNB、 IPsec GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPN

考题 You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security

考题 You have a multi-area OSPF network and you’re concerned because one of the sites is havingconnectivity problem to resources in a different area. Which IOS privileged mode command wouldyou enter to confirm that your network:  (A) has a path to its ABR,  (B) has a path to its ASBR, and  (C)the SPF calculation is functional?()A、show ip protocolsB、show running-configC、show ip ospf neighborD、show ip ospf border-routers

考题 You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast

考题 You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm

考题 You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop

考题 Your network contains an Active Directory domain that has two sites.    You need to identify whether logon scripts are replicated to all domain controllers.   Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL

考题 Your network contains an Active Directory forest. The forest contains multiple sites.     You need to enable universal group membership caching for a site.  What should you do()A、From Active Directory Sites and Services, modify the NTDS Settings.B、From Active Directory Sites and Services, modify the NTDS Site Settings.C、From Active Directory Users and Computers, modify the properties of all universal groups used in the site.D、From Active Directory Users and Computers, modify the computer objects for the domain controllers in the site.

考题 Your company has a main office and 40 branch offices. Each branch office is configured as a  separate Active Directory site that has a dedicated read-only domain controller (RODC). An  RODC server is stolen from one of the branch offices.     You need to identify the user accounts that were cached on the stolen RODC server.     Which utility should you use()A、Dsmod.exeB、Ntdsutil.exeC、Active Directory Sites and ServicesD、Active Directory Users and Computers

考题 单选题One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A  full meshB  peer-to-peerC  partial meshD  hub and spoke

考题 单选题One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()A  Virtual GatewayB  Real-IP GatewayC  NAT GatewayD  Central Gateway

考题 多选题You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()AVPNBInfiniBandCSCSI over IPDRemote Direct Memory Access

考题 单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A Network managementB Network optimizationC Network securityD Content storage networking

考题 单选题You have amulti-area OSPF network and you’re concerned because one of the sites is having connectivity problem to resources in a different area. Which IOS privileged mode command would you enter to confirm that your network :A.has a path to itsABR,B.has a path to itsASBR,and C.the SPF calculation is functional()A show ip protocolsB show running-configC show ip ospfneighborD show ip ospfborder-routers

考题 单选题You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A  Easy VPNB  IPsec GRE tunnelingC  Virtual Tunnel InterfacesD  Dynamic Multipoint VPN

考题 单选题One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()A Virtual GatewayB Real-IP GatewayC NAT GatewayD Central Gateway

考题 单选题You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A full meshB peer-to-peerC partial meshD hub and spoke

考题 多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates