网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
A.full mesh
B.peer-to-peer
C.partial mesh
D.hub and spoke
参考答案
更多 “ You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A.full meshB.peer-to-peerC.partial meshD.hub and spoke ” 相关考题
考题
A network has been developed with resources from six different departments. One of the six departments has just informed you that they can increase the number of employees from to . This will result in:A.A shortening of the critical path.B.A shortening of the noncritical path.C.A decrease in the total cost of the project.D.An increase in the cost of the project.E.A through D are possible based upon where the resources are deployed.
考题
104 A network has been developed with resources from six different departments. One of the six departments has just informed you that they can increase the number of employees from 5 to 8. This will result in:A. A shortening of the critical path.B. A shortening of the noncritical path.C. A decrease in the total cost of the project.D. An increase in the cost of the project.E. A through D are possible based upon where the resources are deployed
考题
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A. then rejectB. then discardC. then next filterD. then silent-drop
考题
You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts.Which network mask should you use?()A.255.255.255.192B.255.255.255.224C.255.255.255.240D.255.255.255.248E.255.255.255.252F.255.255.255.254
考题
You work as network consultant. Your customer, TestKing Inc, has a class C network license. TestKing wants you to subnet the network to provide a separate subnet for each of its 5 departments. Each subnet must support at least 24 hosts. Which network mask should you use?()A、255.255.255.192B、255.255.255.224C、255.255.255.240D、255.255.255.248E、255.255.255.252F、255.255.255.254
考题
One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A、 full meshB、 peer-to-peerC、 partial meshD、 hub and spoke
考题
Your network contains a single Active Directory domain that has two sites named Site1 and Site2. Site1 has two domain controllers named DC1 and DC2. Site2 has two domain controllers named DC3 and DC4. DC3 fails. You discover that replication no longer occurs between the sites. You verify the connectivity between DC4 and the domain controllers in Site1. On DC4, you run repadmin.exe /kcc. Replication between the sites continues to fail. You need to ensure that Active Directory data replicates between the sites. What should you do()A、From Active Directory Sites and Services, modify the properties of DC3.B、From Active Directory Sites and Services, modify the NTDS Site Settings of Site2.C、From Active Directory Users and Computers, modify the location settings of DC4.D、From Active Directory Users and Computers, modify the delegation settings of DC4.
考题
You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A、 Easy VPNB、 IPsec GRE tunnelingC、 Virtual Tunnel InterfacesD、 Dynamic Multipoint VPN
考题
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A、Content storage networkingB、Network optimizationC、Network managementD、Network security
考题
You have a multi-area OSPF network and you’re concerned because one of the sites is havingconnectivity problem to resources in a different area. Which IOS privileged mode command wouldyou enter to confirm that your network: (A) has a path to its ABR, (B) has a path to its ASBR, and (C)the SPF calculation is functional?()A、show ip protocolsB、show running-configC、show ip ospf neighborD、show ip ospf border-routers
考题
You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()A、Protecting the business from information outagesB、Optimizing the efficiency with which IT operatesC、An increased need for specialized IT silosD、IT systems grow fast
考题
You are the network consultant from passguide.com. Do you know what attacks are software based attacks that disable your computer and attack user by e-mail? ()A、ExecutableB、TrojanC、VirusD、Worm
考题
You have a firewall filter applied in an inbound direction on a customer interface. You would like this filter to protect your network from a spoofed denial of service attack. Which action should be configured to accomplish your goal?()A、then rejectB、then discardC、then next filterD、then silent-drop
考题
Your network contains an Active Directory domain that has two sites. You need to identify whether logon scripts are replicated to all domain controllers. Which folder should you verify()A、GroupPolicyB、NTDSC、SoftwareDistributionD、SYSVOL
考题
Your network contains an Active Directory forest. The forest contains multiple sites. You need to enable universal group membership caching for a site. What should you do()A、From Active Directory Sites and Services, modify the NTDS Settings.B、From Active Directory Sites and Services, modify the NTDS Site Settings.C、From Active Directory Users and Computers, modify the properties of all universal groups used in the site.D、From Active Directory Users and Computers, modify the computer objects for the domain controllers in the site.
考题
Your company has a main office and 40 branch offices. Each branch office is configured as a separate Active Directory site that has a dedicated read-only domain controller (RODC). An RODC server is stolen from one of the branch offices. You need to identify the user accounts that were cached on the stolen RODC server. Which utility should you use()A、Dsmod.exeB、Ntdsutil.exeC、Active Directory Sites and ServicesD、Active Directory Users and Computers
考题
单选题One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A
full meshB
peer-to-peerC
partial meshD
hub and spoke
考题
单选题One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()A
Virtual GatewayB
Real-IP GatewayC
NAT GatewayD
Central Gateway
考题
多选题You are the network consultant from passguide.com. You should tell your clients Two technologies help them save much time from complex computing. ()AVPNBInfiniBandCSCSI over IPDRemote Direct Memory Access
考题
单选题You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()A
Network managementB
Network optimizationC
Network securityD
Content storage networking
考题
单选题You have amulti-area OSPF network and you’re concerned because one of the sites is having connectivity problem to resources in a different area. Which IOS privileged mode command would you enter to confirm that your network :A.has a path to itsABR,B.has a path to itsASBR,and C.the SPF calculation is functional()A
show ip protocolsB
show running-configC
show ip ospfneighborD
show ip ospfborder-routers
考题
单选题You are the network consultant from Cisco.com.Your customer has eight sites and will add in thefuture. Branch site to branch site traffic is approaching 30 percent. The customer’s goals are to make iteasier to add branch sites in the future and to reduce traffic through the hub. Which VPN topology should you recommend?()A
Easy VPNB
IPsec GRE tunnelingC
Virtual Tunnel InterfacesD
Dynamic Multipoint VPN
考题
单选题One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()A
Virtual GatewayB
Real-IP GatewayC
NAT GatewayD
Central Gateway
考题
单选题You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A
full meshB
peer-to-peerC
partial meshD
hub and spoke
考题
多选题You are the network consultant from passguide.com. In which situation you will advice your customer to implement data centers?()AAn increased need for specialized IT silosBProtecting the business from information outagesCIT systems grow fastDOptimizing the efficiency with which IT operates
热门标签
最新试卷