單項(xiàng)選擇題Compared to the traditional Layer 2 and Layer 3 system, how does the Cisco Catalyst 6500 VSS1440 simplify the network? ()

A. provides loop-free technology
B. manages additional routing peers
C. provides HSRP/VRRP
D. manages two nodes and configuration


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two benefits are provided when Cisco enterprise solutions are employed across all placesin the network? ()(Choose two.)

A. regular upgrade process
B. multivendor support
C. cost savings
D. product variety
E. well-tested interoperability

2.多項(xiàng)選擇題What are two outcomes of deploying virtual SANs?() (Choose two.)

A. increased administration
B. improved availability
C. reduced backup
D. increased security
E. greater storage demand

3.多項(xiàng)選擇題Which three connection options are available when configuring a switch port to be part of aprivate VLAN? ()(Choose three.)

A. is olated mode
B. switchport mode
C. modular mode
D. community mode
E. promiscuous mode
F. global mode

4.單項(xiàng)選擇題How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()

A. NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.
B. NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.
C. NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.
D. NetFlow can be configured to identify voice and video traffic flows and place them into a lowlatency queue for expedited processing.

5.單項(xiàng)選擇題

Refer to the exhibit. Which of the following statements is true? ()

A. BGP NSF awareness is enabled
B. SSO for BGP NSF capability is enabled
C. BGP graceful restart awareness is enabled
D. 10.11.1.187 is configured as an NSF-capable BGP neighbor

6.單項(xiàng)選擇題Which description best characterizes the Cisco mobility solution? ()

A. provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit
B. authenticates users and devices so that it is impossible for a rogue device to be connected to the network
C. allows you to centralize management, automate repetitive tasks, and provision IP services easily
D. centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN

7.單項(xiàng)選擇題What is the final step that should take place when characterizing an existing network? ()

A. Form an impression about the network.
B. Prepare and add to the network description.
C. Use traffic analysis to augment organizational input.
D. Perform a network audit.

8.單項(xiàng)選擇題What is the first step of the core baselining process? ()

A. Verify that the SNMP MIB is supported in the relevant core device.
B. Implement monitoring using SNMP or RMON.
C. Poll and record specific SNMP MIB objects from the device.
D. Implement threshold monitoring using RMON.

9.單項(xiàng)選擇題Which Cisco solution was developed to let you create separate networks on one SAN; thusproviding you with improved availability, security, and backup? ()

A. Cisco Direct Attached Storage
B. Cisco Direct Storage Area Network
C. Cisco Virtual Storage Area Network
D. Cisco Virtual Attached Storage Network

10.單項(xiàng)選擇題Which dedicated VPN acceleration module for the Cisco 7200 and 7300 Series Routers supportsthe latest encryption standards?()

A. Cisco Network Assistant
B. Cisco IPS
C. AES
D. Cisco VAM2+

最新試題

What is the most likely reason that an IBGP route that has been selected as a best route is not entered into the IP routing table?()

題型:?jiǎn)雾?xiàng)選擇題

Which configuration will enable OSPF for IPv6 on FastEthernet 0/0/0?()

題型:?jiǎn)雾?xiàng)選擇題

Which Cisco IOS command is used to troubleshoot a problem in which a BGP session stays in the active state?()

題型:?jiǎn)雾?xiàng)選擇題

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)

題型:多項(xiàng)選擇題

Which keyword is used with the debug ipv6 [keyword] command to troubleshoot neighbor discovery problems?()

題型:?jiǎn)雾?xiàng)選擇題

What are four advantages to using tunnel brokers in an IPv6 transition environment?()

題型:多項(xiàng)選擇題

You are trying to initiate an SSH connection to a remote router and are getting rejected with an error code of 0. Which of these might be the cause of the error?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. You have a non-Cisco switch that is not communicating properly while connected to the distribution-layer Cisco switching fabric.Which two best-practice actions can you take to overcome this problem? ()(Choose two.)

題型:多項(xiàng)選擇題

Which of the following is an easy-to-use tool that allows you to easily configure and monitor Cisco Integrated Services Routers?()

題型:?jiǎn)雾?xiàng)選擇題

On the Catalyst 6500 Series switch, which command is used to establish a console connection to the Firewall Services Module?()

題型:?jiǎn)雾?xiàng)選擇題