网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which of the following is the primary consideration to scale VPNs?()
A. packets per second
B. number of remote sites
C. throughput bandwidth
D. number of tunnels
参考答案
更多 “ Which of the following is the primary consideration to scale VPNs?() A. packets per secondB. number of remote sitesC. throughput bandwidthD. number of tunnels ” 相关考题
考题
which of the following industries account for more than half of the gdp in canada?A. Primary industries.B. None of them.C. Tertiary industries.D. Secondary industries.
考题
Which of the following is not associative meaning?A、collocative meaningB、stylistic meaningC、affective meaningD、primary meaning
考题
Which one of the following methods is not formative evaluation?A.questionnaire survey
B.final examination
C.portfolio
D.evaluation scale
考题
Which of the following are common issues that should be considered when establishing ortroubleshooting site-to-site VPNs?(Choose all that apply.)()A、User authenticationB、Overlapping IP address spaceC、GRE or IPsec configurationD、MTU sizeE、VPN client softwareF、Authentication server configured ly
考题
Which three characteristics of the traffic flow are taken into consideration when the QoS-for-VPNs feature (QoS pre-classify) provides packet classification and applies appropriate QoS service on tunnel interfaces?()A、IP precedence bitsB、DSCP bitsC、original port numbersD、DE bitsE、source IP addressF、destination IP address
考题
Which of the following is a disadvantage of using the EIGRP protocol?()A、It does not scale wellB、It converges slower than OSPFC、It is a proprietary protocolD、It is a distance vector protocol
考题
Which of the following is the MOST important consideration when implementing a data retentio program?()A、 The data destruction requirementsB、 The user awareness training programC、 The laws and legal requirements of the dataD、 The companys individual data retention policies
考题
Which of the following is the MOST important consideration when purchasing a new server for a mission critical application?()A、RAID 0 compliantB、Notifying all stakeholders of the server upgradeC、Service Level AgreementD、KVM access
考题
A second network card in a server that activates if the primary card fails is an example of which of the following network performance optimization?()A、Load balancingB、QoSC、High availabilityD、Fault tolerance
考题
Which of the following concepts is described as multiple(多重) logical(逻辑) subnets(子网) traversing the same physicalnetwork(物理网络)?()A、 DHCPB、 VLANsC、 DMZD、 VPNs
考题
In a typical PDA, which of the following is the primary input tool?()A、voice navigationB、stylusC、scroll wheelD、keyboard
考题
Which of the following are primary differences between a laptop and a desktop CPU?()A、heat production B、L2 Cache C、clock speed D、front side busE、power consumption
考题
In a DNS environment, the zone file that maps hostnames to IP address (sometimes called the named.hosts file), is created on which of the following servers?()A、CacheB、PrimaryC、SecondaryD、Primary and secondary
考题
A customer has an IBM System Storage DS8700 at their primary site and an XIV system at their recovery site, which is 9.5 kilometers away. They want to replicate data for disaster recovery backup. Which factor is a primary consideration when proposing a solution for this customer()A、compatibility of copy functionsB、difference in capacities in the two systemsC、cache size discrepancies between the two systemsD、the necessity of using two storage management products
考题
单选题Which of the following concepts is described as multiple(多重) logical(逻辑) subnets(子网) traversing the same physicalnetwork(物理网络)?()A
DHCPB
VLANsC
DMZD
VPNs
考题
多选题When comparing CPE and provider-provisioned VPNs (PPVPN), which two statements are true?()ACPE VPN’s require dedicated VPN aware hardware at customer site, PPVPN does not.BPPVPN’s require dedicated VPN aware hardware at customer site, CPE VPN’s does not.CCPE VPN’s scale better than PPVPN’s as they do not require a per site configuration on the CPEDPPVPN’s scale better than CPE VPN’s as they do not require a per site configuration on the CPE
考题
单选题Which of the following is the primary consideration to scale VPNs?()A
packets per secondB
number of remote sitesC
throughput bandwidthD
number of tunnels
考题
单选题An administrator is creating a new data retention policy. Which of the following is the MOST important consideration?()A
Compile technical requirements for new policyB
Comply with applicable laws and regulationsC
Destroy the old data retention policyD
Have hard copies of the new policy stored offsite
考题
单选题Which of the following is the MOST important consideration when implementing a data retentio program?()A
The data destruction requirementsB
The user awareness training programC
The laws and legal requirements of the dataD
The companys individual data retention policies
考题
单选题Which of the following is the primary consideration to scale VPNs?()A
packets per secondB
number of remote sitesC
throughput bandwidthD
number of tunnels
考题
单选题Which of the following would be used to lock all of the primary communication equipment of abuilding, including its demarcation point?()A
MTRB
MDFC
Smart jackD
IDF
考题
单选题For the following items, which one acts as a VPN termination device and is located at a primary networklocation?()A
Broadband serviceB
Headend VPN deviceC
VPN access deviceD
Tunnel
考题
单选题Which of the following is a disadvantage of using the EIGRP protocol?()A
It does not scale wellB
It converges slower than OSPFC
It is a proprietary protocolD
It is a distance vector protocol
考题
多选题Which of the following are common issues that should be considered when establishing ortroubleshooting site-to-site VPNs?(Choose all that apply.)()AUser authenticationBOverlapping IP address spaceCGRE or IPsec configurationDMTU sizeEVPN client softwareFAuthentication server configured ly
考题
单选题A home user wants to setup a wireless network. Which of the following would be the MOST important consideration?()A
Operating system type of the connected PCsB
Location of the wireless routerC
Number of PCs that will access the networkD
Number of available Ethernet ports on the router
考题
多选题Which three characteristics of the traffic flow are taken into consideration when the QoS-for-VPNs feature (QoS pre-classify) provides packet classification and applies appropriate QoS service on tunnel interfaces?()AIP precedence bitsBDSCP bitsCoriginal port numbersDDE bitsEsource IP addressFdestination IP address
考题
单选题A customer has an IBM System Storage DS8700 at their primary site and an XIV system at their recovery site, which is 9.5 kilometers away. They want to replicate data for disaster recovery backup. Which factor is a primary consideration when proposing a solution for this customer()A
compatibility of copy functionsB
difference in capacities in the two systemsC
cache size discrepancies between the two systemsD
the necessity of using two storage management products
热门标签
最新试卷