网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()
A. peer-to-peer
B. partial mesh
C. hub and spoke
D. full mesh
参考答案
更多 “ Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?() A. peer-to-peerB. partial meshC. hub and spokeD. full mesh ” 相关考题
考题
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()
A. ICMPB. SNMPC. TCPD. HTTPS
考题
Which of the following describes a secure connection over the Internet between two sites?()
A. FTPB. VLANC. VPND. HTTP
考题
A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()A. operator trainingB. cache size of the two clustersC. fibre bandwidth capability between the sitesD. number of stacked tape drives attached to each cluster
考题
If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()A、A sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkB、A sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedC、A SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorD、A SHAM link is part of OSPF network of MPLS-VPN provider
考题
In which two locations in an enterprise network can an IPS sensor be placed?()A、bridging VLANs on two switchesB、bridging two VLANs on one switchC、between two Layer 2 devices withtrunkingD、between two Layer 2 devices withouttrunkingE、between a Layer 2 device and a Layer 3 device withtrunking
考题
Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()A、sham linkB、down bitC、virtual linkD、Site of OriginE、domain tag
考题
One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()A、 full meshB、 peer-to-peerC、 partial meshD、 hub and spoke
考题
Which of the following is a benefit of a hot spare?()A、 Lower costB、 Allows two RAID 1 drives to simultaneously fail without losing any dataC、 Enhanced fault toleranceD、 Enhanced performance
考题
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS
考题
A customer has two single cluster IBM TS7700 Virtualization Engines at the same site. The customer wants to move one to a remote site and set up a grid configuration with the two clusters. The customer has fibre between the two sites. What is the most important factor to consider when planning the new configuration?()A、operator trainingB、cache size of the two clustersC、fibre bandwidth capability between the sitesD、number of stacked tape drives attached to each cluster
考题
In which two locations in an enterprise network can an IPS sensor be placed? ()A、 bridging VLANs on two switchesB、 bridging two VLANs on one switchC、 between two Layer 2 devices with trunkingD、 between two Layer 2 devices without trunkingE、 between a Layer 2 device and a Layer 3 device with trunking
考题
What is the primary use of a remote access VPN?()A、to secure communication between two remote PCsB、to secure communication between two remote officesC、to secure communication betweenan remote PC and the corporate intranetD、to secure communication between a corporate intranet and the public internet
考题
A customer has two sites located 500 kilometers apart. The customer has both a high-speedInternet link and dark fiber between the sites. The customer wants to utilize storage resources ateither site leveraging replication for disaster recovery implementations. The customer wants to linkthese two sites together. Which option provides the highest performance and is most reliable?()A、iFCP routerB、FCIP routerC、DWDM and CWDMD、LC multi-mode 50 micron fiber
考题
A customer is planning on establishing a Global Mirror between two Storwize V7000 storagearrays. The customer is planning to lease an IP WAN connection between sites for the tasks andis running a SAP (database) application on Oracle. Which of the following planning considerationsis most important?()A、the distance between sites needs to be less than 100 kilometersB、consistency groups should be created to maintain write order on the remote mirrorC、ensure sufficient bandwidth exists on the link based on average application workloadsD、ensuring a low round trip latency of less than 30ms on the WAN connection is required
考题
Which two are characteristics of the Transfer Object design pattern?()A、It reduces network traffic by collapsing multiple remote requests into one.B、It increases the complexity of the remote interface by removing coarse-grained methods.C、It increases the complexity of the design due to remote synchronization and version control issues.D、It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.
考题
You need to design a remote access solution for the mobile sales users in the litwareinc.com domain. Which two actions should you perform?()A、Configure autoenrollment for user certificates and computer certificatesB、Configure Web enrollment for user certificates and computer certificatesC、Configure a Certificate Services hierarchy in the litwareinc.com domainD、Configure qualified subordination between the litwareinc.com and the contoso.com domainsE、Configure PEAP authentication on the remote access servers
考题
You need to design a method of communication between the IT and HR departments. Your solution must meet business requirements. What should you do?()A、Design a custom IPSec policy to implement Encapsulating Security Payload (ESP) for all IP traffic Design the IPSec policy to use certificate-based authentication between the two departments’ computersB、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersC、Design a customer IPSec policy to implement Encapsulating Payload (ESP) for all IP traffic. Desing the IPSec policy to use preshared key authentication between the two departments’ computersD、Design a customer IPSec policy to implement Authentication Header (AH) for all IP traffic. Desing the IPSec policy to use certificate-based authentication between the two departments’ computers
考题
多选题Which two secure remote access methods are available on the WX platforms?() (Choose two.)ASSLBSSHCTelnetDHTTP
考题
单选题Which of the following is a benefit of a hot spare?()A
Lower costB
Allows two RAID 1 drives to simultaneously fail without losing any dataC
Enhanced fault toleranceD
Enhanced performance
考题
单选题Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()A
peer-to-peerB
partial meshC
hub and spokeD
full mesh
考题
多选题Which two features prevent routing loops between the OSPF sites of a customer when the sites aremultihomed or a backdoor link is used between the sites? ()Asham linkBdown bitCvirtual linkDSite of OriginEdomain tag
考题
单选题What is the primary use of a remote access VPN?()A
to secure communication between two remote PCsB
to secure communication between two remote officesC
to secure communication betweenan remote PC and the corporate intranetD
to secure communication between a corporate intranet and the public internet
考题
多选题If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()AA sham-link is created between any twoo VPN sites that belong to the same OSPF area and share an OSPF backdoor linkBA sham-link is seen as an intra-area link between PE routers,an OSPF adjacency is created and data base is exchangedCA SHAM link is created between two directly connected PE routers so that it is preferred over the low speed backdoor doorDA SHAM link is part of OSPF network of MPLS-VPN provider
考题
单选题Which of the following describes a secure connection over the Internet between two sites?()A
FTPB
VLANC
VPND
HTTP
考题
多选题Which two are characteristics of the Transfer Object design pattern?()AIt reduces network traffic by collapsing multiple remote requests into one.BIt increases the complexity of the remote interface by removing coarse-grained methods.CIt increases the complexity of the design due to remote synchronization and version control issues.DIt increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.
考题
单选题Final exams were incredibly comprehensive, and went on for two weeks, which length made it seem as if they would never end.A
comprehensive, and went on for two weeks, which length madeB
comprehensive and since they went on for two weeks, that madeC
comprehensive and, since they went on for two weeks, to makeD
comprehensive and went on for two weeks, which madeE
comprehensive and, by going on for two weeks, it made
考题
单选题You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()A
connection speedB
number of remote sitesC
features to be supportedD
types of devices at the remote site
热门标签
最新试卷