單項選擇題Which of these is a correct description of SSO?()

A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of these statements is correct regarding SSO and Cisco NSF?()

A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than one second.
E. NSF and SSO with redundant supervisors have the most impact on outages at the access layer.

2.單項選擇題To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()

A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with a Layer 2 link
D. to two core switches from redundant distribution switches connected with a Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

3.單項選擇題When a router has to make a rate transition from LAN to WAN, what type of congestion needs should be considered in the network design?()

A. RX-queue deferred
B. TX-queue deferred
C. RX-queue saturation
D. TX-queue saturation
E. RX-queue starvation
F. TX-queue starvation

4.多項選擇題

Which two practices will avoid Cisco Express Forwarding polarization?()

A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.

5.多項選擇題Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()

A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
E. At least 33 percent of the link bandwidth should be reserved for default best-effort class.

6.單項選擇題Which version of spanning tree is recommended for the enterprise campus?()

A.CST
B.MST
C.STP
D.PVST+
E.RPVST+

7.多項選擇題Under which two circumstances should Spanning Tree Protocol be implemented?()

A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol

8.單項選擇題

Refer to the exhibit. Which recommended practice is applicable?()

A. If no core layer is deployed, the design will be easier to scale.
B. If no core layer is deployed, there will be fewer cabling requirements.
C. If no core layer is deployed, the distribution switches should not be fully meshed.
D. A dedicated campus core layer is not needed for connecting fewer than five buildings.
E. A dedicated campus core layer should be deployed for connecting three or more buildings.

9.單項選擇題Which of these recommendations is most appropriate for the Cisco Campus Architecture?()

A. Utilize Layer 3 switching.
B. Utilize software accelerated services.
C. Aggregate end users and support a feature-rich environment.
D. Perform packet manipulation and filtering at the core layer.
E. Use redundant point-to-point Layer 2 interconnections when there is a link or node failure.

10.單項選擇題In a base e-Commerce module design, which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

最新試題

As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()

題型:單項選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:單項選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:單項選擇題

Please match the Cisco NAC appliance component to its description.()(1)Cisco NAS(2)Cisco NAA(3)Rule-set Lpdates(4)Cisco NAM(a) a centralized management point(b) an in-band cr out-of-band device for network access control(c) a Windows-based client which allows network access based on the tasks running(d) a status crecker for operating systems,antivirus,antispyware,etc.

題型:單項選擇題

During consultation, you find that a customer has multiple asset closets and will be adding more in the future. Which NAS physical deployment model would you suggest to this customer?()

題型:單項選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:單項選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:單項選擇題

Which of the following is the primary consideration to scale VPNs?()

題型:單項選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:單項選擇題