网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()
A. Troubleshooting is more complicated.
B. Service and switch modules are underutilized.
C. Layer 2 adjacency is required with the servers that use this design.
D. Layer 3 adjacency is required with the servers that use this design.
E. Load balancing will always occur across both access layer uplinks.
参考答案
更多 “ Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?() A. Troubleshooting is more complicated.B. Service and switch modules are underutilized.C. Layer 2 adjacency is required with the servers that use this design.D. Layer 3 adjacency is required with the servers that use this design.E. Load balancing will always occur across both access layer uplinks. ” 相关考题
考题
Which of the following statements describe the use of the keywordstatic?a) Within the body of a function: A static variable maintains its valuebetween function revocationsb) Within a module: A static variable is accessible by all functionswithin that modulec) Within a module: A static function can only be called by otherfunctions within that module
考题
The primary line module has failed and the spare line module is nowactive.What occurs,by default,when the primary line module returns to an operational status?()
A.The primary line module is inactive for five minutes and then becomes active.B.The primary line module is in standby mode,while the spare line module remains active.C.The primary line module becomes active immediately and the spare line module becomes inactive.D.The primary and spare line modules are active for five minutes,after which time the spare line module becomes inactive.
考题
Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)
A. includes three design levelsB. incorporates products and technologies into enterprise, service provider, and commercial systemsC. extends the value of designs through a sustained development planD. does not factor customer input design processE. facilitates faster and more reliable customer deploymentsF. incorporates a narrow range of technologies and products
考题
When you decide on Campus QoS Design elements, which two statements correctly identify considerations to be taken into account?()
A. Voice needs to be assigned to the hardware priority queue.B. Voice needs to be assigned to the software priority queue.C. Call signaling must have guaranteed bandwidth service.D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
考题
Understanding what to measure and why it is being measured are key contributors to which part of the Service Lifecycle?( ) 。A.Service Strategy
B.Continual Service Improvement
C.Service Operation
D.Service Design
考题
Router R1 and R2 are both configured for HSRP. Which two statements about the HSRP priorities of these two routers are true?()A、 To assign the HSRP router priority in a standby group, the standby group-number priority priority-value global configuration command must be used.B、 The default priority of a router is zero (0).C、 The no standby priority command assigns a priority of 100 to the router.D、 Assuming that preempting has also been configured, the router with the lowest priority in an HSRP group would become the active router.E、 When two routers in an HSRP standby group are configured with identical priorities, the router with the highest configured IP address will become the active router.
考题
Which two statements correctly describe characteristics of the PortFast feature? ()A、STP will be disabled on the port.B、PortFast can also be configured on trunk ports.C、PortFast is required to enable port-based BPDU guard.D、PortFast is used for both STP and RSTP host ports.E、PortFast is used for STP-only host ports.
考题
Which two statements correctly describe UDLD? ()A、Unidirectional link detection is achieved through monitoring STP BPDUs.B、It is recommended that it be enabled globally rather than on an individual port.C、When an error is detected, normal mode will disable a port.D、It is recommended that it be enabled in normal mode.E、It is recommended that it be used with the loop guard feature.
考题
While deploying a new application module, the software vendor ships the application software along with appropriate SQL plan baselines for the new SQLs being introduced. Which two statements describe the consequences?()A、The plan baselines can be evolved over time to produce better performance.B、The newly generated plans are directly placed into the SQL plan baseline without being verified.C、The new SQL statements initially run with the plans that are known to produce good performance under standard test configuration.D、The optimizer does not generate new plans for the SQL statements for which the SQL plan baseline has been imported.
考题
Which statement correctly describes IPsec VPN backup technology?()A、The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB、Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC、Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD、The cypto isakmp keepalive command is used to configure stateless failover
考题
Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)A、includes three design levelsB、incorporates products and technologies into enterprise, service provider, and commercial systemsC、extends the value of designs through a sustained development planD、does not factor customer input design processE、facilitates faster and more reliable customer deploymentsF、incorporates a narrow range of technologies and products
考题
Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()A、Troubleshooting is more complicated.B、Service and switch modules are underutilized.C、Layer 2 adjacency is required with the servers that use this design.D、Layer 3 adjacency is required with the servers that use this design.E、Load balancing will always occur across both access layer uplinks.
考题
Which statement correctly describes a situation in which VRFs are used in the data center?()A、Partitioning of network resources is enabled.B、VRFs cannot support path isolation from MAN/WAN designs.C、VRFs cannot be used to map a virtualized data center to a MPLS implementation.D、VRFs do not allow for the use of application services with multiple access topologies.E、An access design using a VRF allows for an aggregation layer service module solution.
考题
Which two of these statements best describe fast secure roaming? (Choose two.)() A、 available only in autonomous APsB、 available in autonomous and lightweight APsC、 a feature of WDS in autonomous APsD、 a feature of WDS in lightweight APsE、 requires at least one AP and one Wireless LAN Services Module
考题
Which one of the statements below correctly describes the Virtual Router Redundancy Protocol (VRRP), which is being used in the Company network to provide redundancy?()A、 A VRRP group has one active and one or more standby virtual routers.B、 A VRRP group has one master and one or more backup virtual routers.C、 A VRRP group has one master and one redundant virtual router.D、 None of the other alternatives apply
考题
多选题Which two of these statements best describe fast secure roaming? (Choose two.)()Aavailable only in autonomous APsBavailable in autonomous and lightweight APsCa feature of WDS in autonomous APsDa feature of WDS in lightweight APsErequires at least one AP and one Wireless LAN Services Module
考题
多选题Regarding L2TP, in which two situations is a service module or service IOA required?() (Choose two.)Aalways for LNSBalways for LACCLAC with fragmentation in the tunnelDLNS when there are greater than 2000 sessions
考题
多选题Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used?()ATroubleshooting is more complicated.BService and switch modules are underutilized.CLayer 2 adjacency is required with the servers that use this design.DLayer 3 adjacency is required with the servers that use this design.ELoad balancing will always occur across both access layer uplinks.
考题
多选题Which two statements correctly describe UDLD? ()AUnidirectional link detection is achieved through monitoring STP BPDUs.BIt is recommended that it be enabled globally rather than on an individual port.CWhen an error is detected, normal mode will disable a port.DIt is recommended that it be enabled in normal mode.EIt is recommended that it be used with the loop guard feature.
考题
单选题The primary line module has failed and the spare line module is nowactive.What occurs,by default,when the primary line module returns to an operational status?()A
The primary line module is inactive for five minutes and then becomes active.B
The primary line module is in standby mode,while the spare line module remains active.C
The primary line module becomes active immediately and the spare line module becomes inactive.D
The primary and spare line modules are active for five minutes,after which time the spare line module becomes inactive.
考题
多选题Which two statements describe the default routing policy for BGP?()AAdvertise only locally originated routes.BAccept all BGP routes and import into inet.0.CAdvertise all active BGP routes.DAdvertise only EBGP routes.
考题
多选题While deploying a new application module, the software vendor ships the application software along with appropriate SQL plan baselines for the new SQLs being introduced. Which two statements describe the consequences?()AThe plan baselines can be evolved over time to produce better performance.BThe newly generated plans are directly placed into the SQL plan baseline without being verified.CThe new SQL statements initially run with the plans that are known to produce good performance under standard test configuration.DThe optimizer does not generate new plans for the SQL statements for which the SQL plan baseline has been imported.
考题
单选题Which one of the statements below correctly describes the Virtual Router Redundancy Protocol (VRRP), which is being used in the Company network to provide redundancy?()A
A VRRP group has one active and one or more standby virtual routers.B
A VRRP group has one master and one or more backup virtual routers.C
A VRRP group has one master and one redundant virtual router.D
None of the other alternatives apply
考题
多选题Which two statements correctly describe characteristics of the PortFast feature? ()ASTP will be disabled on the port.BPortFast can also be configured on trunk ports.CPortFast is required to enable port-based BPDU guard.DPortFast is used for both STP and RSTP host ports.EPortFast is used for STP-only host ports.
考题
多选题Which three statements correctly describe the Cisco Validated Designs program? ()(Choose three.)Aincludes three design levelsBincorporates products and technologies into enterprise, service provider, and commercial systemsCextends the value of designs through a sustained development planDdoes not factor customer input design processEfacilitates faster and more reliable customer deploymentsFincorporates a narrow range of technologies and products
考题
多选题When you decide on Campus QoS Design elements, which two statements correctly identify considerations to be taken into account?()AVoice needs to be assigned to the hardware priority queue.BVoice needs to be assigned to the software priority queue.CCall signaling must have guaranteed bandwidth service.DStrict-priority queuing should be limited to 50 percent of the capacity of the link.
考题
单选题Which statement correctly describes IPsec VPN backup technology?()A
The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO)protocolB
Reverse Route Injection (RRI) is configured on at the remote site to inject the central sitenetworksC
Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MACaddresses and a virtual IP addressD
The cypto isakmp keepalive command is used to configure stateless failover
热门标签
最新试卷