單項選擇題When is a first-hop redundancy protocol needed in the distribution layer?()

A. when HSRP is not supported by the design
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution switch
F. when the design implements Layer 3 between the access switch and the distribution switch


您可能感興趣的試卷

你可能感興趣的試題

1.單項選擇題Which of these recommended designs provides the highest availability?()

A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP

2.單項選擇題Which of these is a correct description of SSO?()

A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.

3.單項選擇題Which of these statements is correct regarding SSO and Cisco NSF?()

A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than one second.
E. NSF and SSO with redundant supervisors have the most impact on outages at the access layer.

4.單項選擇題To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()

A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with a Layer 2 link
D. to two core switches from redundant distribution switches connected with a Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO

5.單項選擇題When a router has to make a rate transition from LAN to WAN, what type of congestion needs should be considered in the network design?()

A. RX-queue deferred
B. TX-queue deferred
C. RX-queue saturation
D. TX-queue saturation
E. RX-queue starvation
F. TX-queue starvation

6.多項選擇題

Which two practices will avoid Cisco Express Forwarding polarization?()

A. The core layer should use default Layer 3 hash information.
B. The core layer should use default Layer 4 hash information.
C. The distribution layer should use default Layer 3 hash information.
D. The distribution layer should use default Layer 4 hash information.
E. The core layer should use Layer 3 and Layer 4 information as input to the Cisco Expressing Forwarding hashing algorithm.
F. The distribution layer should use Layer 3 and Layer 4 information as input into the Cisco Expressing Forwarding hashing algorithm.

7.多項選擇題Which two statements correctly identify considerations to take into account when deciding on Campus QoS Design elements?()

A. Voice needs to be assigned to the hardware priority queue.
B. Voice needs to be assigned to the software priority queue.
C. Call signaling must have guaranteed bandwidth service.
D. Strict-priority queuing should be limited to 50 percent of the capacity of the link.
E. At least 33 percent of the link bandwidth should be reserved for default best-effort class.

8.單項選擇題Which version of spanning tree is recommended for the enterprise campus?()

A.CST
B.MST
C.STP
D.PVST+
E.RPVST+

9.多項選擇題Under which two circumstances should Spanning Tree Protocol be implemented?()

A. to ensure a loop-free topology
B. to protect against user-side loops
C. when a VLAN spans access layer switches
D. for the most deterministic and highly available network topology
E. because of the risk of lost connectivity without Spanning Tree Protocol

10.單項選擇題

Refer to the exhibit. Which recommended practice is applicable?()

A. If no core layer is deployed, the design will be easier to scale.
B. If no core layer is deployed, there will be fewer cabling requirements.
C. If no core layer is deployed, the distribution switches should not be fully meshed.
D. A dedicated campus core layer is not needed for connecting fewer than five buildings.
E. A dedicated campus core layer should be deployed for connecting three or more buildings.

最新試題

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

題型:單項選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:單項選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項選擇題

What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

題型:單項選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:單項選擇題

Which of the following is the primary consideration to scale VPNs?()

題型:單項選擇題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:單項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:單項選擇題