多項選擇題What are two characteristics of Server Load Balancing router mode?()

A. The design supports multiple server subnets Cisco 642-874: Practice Exam
B. An end-user sees the IP address of the real server
C. SLB routes between the outside and inside subnets
D. The source or destination MAC address is rewritten, but the IP addresses left alone
E. SLB acts as a "bump in the wire" between servers and upstream firewall or Layer 3 devices


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two statements about SCSI are true? ()

A. The bus is limited to 32 devices
B. It is a full duplex serial standard
C. It is a half-duplex serial standard
D. It allows up to 320 MB/s of shared channel bandwidth

2.多項選擇題Which two statements about layer 3 access designs are correct?()

A. IP address space is difficult to manage.
B. Broadcast and fault domains arc increased
C. Convergence time is fractionally slower than STP
D. Limits on clustering and NIC teaming are removed
E. Fast uplink convergence is supported tor failover and fallback

3.單項選擇題When is a first-hop redundancy protocol needed in the distribution layer?()

A. when the design implements Layer 2 between the access arid distribution blocks
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution blocks
F. when the design implements Layer 2 between the access and distribution blocks

4.多項選擇題From a design perspective which two of the following OHPF Statements are most relevant?()

A. OSPF stub areas can be thought of as a simple form of summarization
B. OSPF cannot filter intra area routes
C. An ARR ran only exist in two areas - the backbone and one adjacent area
D. Performance issues in the Backbone area can be offset by allowing some traffic to transit anon-backbone area
E. the size of an area (the LSDB) will be constrained by the size of the IP MTU

5.單項選擇題When an Enterprise Campus network designer is addressing the merger of two companies with different IGPs, which of the following is considering a super routing design?()

A. Eliminate the management and support for redistribution by choosing and cutting over to asingle IGP at the time of merger
B. Maintain distinct pockets across a moving boundary of routing protocols, redistributing betweenthem
C. Manipulate the administrative distance of the different IGPs to be equal throughout the network
D. Leave the IGPs independent without redistribution wherever communication between companyentities is not required

6.單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed? ()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers

7.多項選擇題Which three Layer 2 access designs have all of their uplinks in an active state? ()

A. Flex Links
B. loop free U
C. looped square
D. looped triangle
E. loop-tree inverted U

8.單項選擇題Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()

A. Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layer
B. Provides host-level redundancy by connecting each end device to 2 separate Access switches 
C. Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRP
D. Include a link between two Access switches to support summarization of routing information

9.單項選擇題Which of these recommendations is most appropriate for the core layer in the Cisco Campus Architecture?()

A. Utilize Layer 3 switching
B. Utilize software accelerated services
C. Aggregate end users and support a feature-rich environment
D. Perform packet manipulation and filtering at the core layer
E. Use redundant point to-point Layer 2 interconnections when where is a link or node failure.

10.單項選擇題There are 3 steps to confirm whether a range of IP address can be summarized. When of thefollowing is used in each of these 3 steps?()

A. The first number in the contiguous block of addresses
B. The last number in the contiguous block of addresses
C. The size of the contiguous block of addresses
D. The subnet mask of the original network address

最新試題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項選擇題

Which path selection protocol is used by Fibre Channel fabrics?()

題型:單項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()

題型:多項選擇題

Which two statements about Cisco Security Management Suite are correct? ()

題型:多項選擇題

Which three mechanisms are used to secure management traffic from outside IPS sensors?()

題型:多項選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項選擇題

What is the traditional mode for a firewall?()

題型:單項選擇題

Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

題型:多項選擇題