單項(xiàng)選擇題What is a criteria of the enterprise composite network model?()

A. includes all modules needed to meet any network design
B. defines flexible boundaries between modules for scalability requirements
C. clearly defines module boundaries and demarcation points to identify where traffic is
D. requires specific core, distribution, and access layer requirements to match the model


您可能感興趣的試卷

你可能感興趣的試題

1.單項(xiàng)選擇題What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()

A. determine types of protocols to be supported
B. determine the environment in which the router will be used
C. select the number of WAN ports required
D. select the number of LAN ports required

2.多項(xiàng)選擇題Dense Wavelength Division Multiplexing (DWDM) is an important innovation in optical networks.Which two descriptions best define DWDM?()

A. optical technology for transmitting up to 32 channels over multiple fiber strands
B. optical technology for transmitting up to 16 channels over multiple fiber strands
C. a WDM system that is compatible with EDFA technology
D. a technology for transmitting more closely packed optical signals using more sophisticated transceiver designs than CWDM .

3.多項(xiàng)選擇題You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()

A. It resembles a Layer 2 bridge.
B. Traffic flow through the IPS resembles traffic flow through a Layer 3 router.
C. Inline interfaces which have no IP addresses cannot be detected.
D. Malicious packets that have been detected are allowed to pass through, but all subsequent traffic is blocked.

4.單項(xiàng)選擇題Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()

A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.
B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.
C. Use class-based policing to limit the peer-to-peer traffic rate.
D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

5.多項(xiàng)選擇題Which two of these key fields are used to identify a flow in a traditional NetFlow implementation?()

A. source port
B. output interface
C. next-hop IP address
D. source MAC address
E. destination IP address
F. next-hop MAC address

最新試題

What is the recommended practice when considering VPN termination and firewall placement?()

題型:?jiǎn)雾?xiàng)選擇題

Which of these is true of a Layer 3 out-of-band NAS deployment?()

題型:?jiǎn)雾?xiàng)選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:?jiǎn)雾?xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()

題型:?jiǎn)雾?xiàng)選擇題

In which tunnel-less VPN topology do group members register with a key server in order to receive the security association necessary to communicate with the group?()

題型:?jiǎn)雾?xiàng)選擇題

What amount of cell overlap ensures smooth roaming for wireless endpoints?()

題型:?jiǎn)雾?xiàng)選擇題

As an experienced technician, you are responsible for Technical Support. One of the trainees is asking your advice on VPN Termination Device and Firewall Placement. Which of the following approaches will you recommend?()

題型:?jiǎn)雾?xiàng)選擇題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:?jiǎn)雾?xiàng)選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:?jiǎn)雾?xiàng)選擇題