网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()
A

host

B

IP phone

C

access layer switch

D

distribution layer switch

E

core layer switch


参考答案

参考解析
解析: 暂无解析
更多 “多选题A network is deployed using best practices of the enterprise campus network model, including users with desktop computers connected via IP phones. Given that all components are QoS-capable,  where are the two optimal locations for trust boundaries to be configured by the network administrator?()AhostBIP phoneCaccess layer switchDdistribution layer switchEcore layer switch” 相关考题
考题 Which IGP should you use to achieve scalability in a large enterprise network using Juniperenterprise routers?() A.RIPB.BGPC.OSPFD.EIGRP

考题 Start of repeated scenarioYou are an enterprise desktop support technician for Fabrikam, Inc. Active Directory InformationThe company has a main office and a branch office. The main office hosts all of the companys servers. The main office connects to the branch office by using a WAN link. The network contains a single Active Directory domain that has 500 users. The domain contains three domain controllers and an enterprise root certification authority (CA). All servers run Windows Server 2008 R2. All user accounts are in an organizational unit (OU) named Employees. The computer accounts for all desktop computers are in an OU named Desktops. The computer accounts for all portable computers are in an OU named Laptops. A startup script is deployed to all computers by using Group Policy objects (GPOs). Client ConfigurationsAll client computers run Windows 7 Enterprise. All users have desktop computers. All computers are members of the domain. All desktop computers use wired connections to connect to the network. All portable computers use wireless connections to connect to the network. The wireless network is secured by using EAP-TLS. Company policy states that all client computers must be configured by using DHCP. The company has an internal Web site. The Web site is configured to useSSL encryption and to require client certificates. All company users can access the internal Web site. End of repeated scenario Users in the branch office report slow network performance when they connect to the file shares in the main office. You need to recommend a solution to improve performance when users access the file shares from the branch office. The solution must minimize hardware costs. What should you recommend implementing?()

考题 Which of the following is the primary motivation for using BGP between an Enterprise and its ISPs?()A、To influence the choice of best path (best route) for at least some routesB、To avoid having to configure static routesC、To allow redistribution of BGP routes into the IGP routing protocolD、To monitor the size of the Internet BGP table

考题 What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A、 RADIUS or LDAPB、 an internal router running EIGRPC、 Reverse Route Injection and OSPF or RIPv2D、 the VPN appliance to be deployed in line with the firewall

考题 Which one is the most important based on the following common elements of a network design?()A、Business needsB、Risk analysisC、Security policyD、Best practices

考题 Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()A、IPsec tunnelB、GRE tunnelC、Floating stati c routeD、An IGP

考题 Enterprise Router R1 connects an Enterprise to the Internet. R1 needs to create and advertise a default route into the Enterprise using EIGRP. The engineer creating the implementation plan has chosen to base this default route on the ip route command, rather than using i p default - network. Which of the following is not a useful step with this style of default route configuration?()A、Create the default route on R1 using the ip route 0.0.0.0 0.0.0.0 outgoinginterface command.B、Redistribute the statically configured defa ult route.C、Disable auto - summary.D、Configure the network 0.0.0.0 command.E、Ensure R1 has no manually configured summary routes using the ip summary- address eigrp command.

考题 When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise, which transition strategyworks the best?()A、Deploy IPv6 at the Edges and tunnel Enterprise through the coreB、Deploy IPv6 at Edges and Core at the same time for smooth transitionC、Deploy IPv6 at the core first and then move to Edges toward the end customerD、None of the above will work

考题 When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A、 RFC 1149B、 RFC 3704C、 RFC 1918D、 RFC 2827

考题 Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()A、 Cisco NSF with SSO and redundant supervisors has the most impact on the campus in theAccess layerB、 Provides host-level redundancy by connecting each end device to 2 separate Access switches C、 Offer default gateway redundancy by using dual connections from Access switches toredundant Distribution layer switches using a FHRPD、 Include a link between two Access switches to support summarization of routing information

考题 Which of the following best describes the purpose of using lifecycle services for deploying an advanced wireless solution?()A、create a more effective sales strategy for partners.B、reinforce customer confidence in partners selling products.C、provide a consistent, repeatable, and proven method to ensure the network solution that is deployed delivers upon the customer’s goals for reliability and availability.D、maximize the number of services required to support advanced technologies.E、more clearly define the roles of account managers, systems engineers, and field engineers.

考题 Company.com has I/O slot constraints on two nodes that are going to be configured in an  HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer.  The best HACMP configuration for these servers is to implement:()  A、 A single adapter network using the Network Interface Card in each nodeB、 A single adapter network using persistent addresses on the Network Interface Card in each nodeC、 A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D、 EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover

考题 You are an Enterprise Architect in a large IT organization. Your organization has deployed applications on a variety of containers such as WLS, WebSphere, and JBoss.  Why would you consider consolidating on a single type of container (instead of mix) ? ()A、 Guarantee of higher application performance and reliability if the transactions are flowing between instances of the same container type.B、Easier to build a Shared Services infrastructure that can provide best practices, tools and expertise around HA/Management.... with a single type of container than a mix of multiple typesC、 You’ll save on hardware costs with a homogenous environmentD、 It’s a necessary step in our move toward adopting SOA

考题 You work as the enterprise exchange administrator at TestKing.com. TestKing.com makes use of Microsoft Exchange Server messaging solution. The TestKing.com network consists of a single ActiveDirectory domain named testking.com. A firewall at Testking.com separates the internal network and a perimeter network. The perimeter networkcontains an Exchange Server 2010 Edge Transport server. You have received instructions from the CIO to install an internal Exchange Server 2010 with the followingcriteria: 1. The support of EdgeSync synchronizaiton and encrypted delivery of outbound e-mail messages to theEdge Transport server. 2. The minimization of the attack surface of the internal network. What should you do?()A、The best option is to use port 3309 and 25 from the internal network to the perimeter network.B、The best option is to use port 3309 and 636 from the internal network to the perimeter network.C、The best option is to use port 50636 and 25 from the internal network to the perimeter network.D、The best option is to use port 50636 and 135 from the internal network to the perimeter network.

考题 You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has acquired a new client access server named -sr11.you have received instructions from the cio to make sure that the employees can access -sr11 by using outlook web app.What should you do?()A、The best option is to run the Test-OwaConnectivity cmdlet in the Exchange Management Shell.B、The best option is to view the session state settings for the Outlook Web Access virtual directory in the Internet Information Services (IIS) Manager.C、The best option is to run a baseline scan in the Exchange Best Practices Analyzer.D、The best option is to check the properties of the default Outlook Web App mailbox policy in the Exchange Management Console (EMC).

考题 单选题Which IGP should you use to achieve scalability in a large enterprise network using Juniperenterprise routers?()A RIPB BGPC OSPFD EIGRP

考题 单选题Company.com has I/O slot constraints on two nodes that are going to be configured in an  HACMP cluster. There is room for only one Network Interface Card in each node,in addition to the built-in Ethernet port on the system planer.  The best HACMP configuration for these servers is to implement:()A  A single adapter network using the Network Interface Card in each nodeB  A single adapter network using persistent addresses on the Network Interface Card in each nodeC  A dual adapter network using the internal Ethernet adapters as an non-service interface with IPAT via IP Replacement.D  EtherChannel high availability for the network connections with HACMP cascading resource groups for data and application fallover

考题 单选题You are an Enterprise Architect in a large IT organization. Your organization has deployed applications on a variety of containers such as WLS, WebSphere, and JBoss.  Why would you consider consolidating on a single type of container (instead of mix) ? ()A  Guarantee of higher application performance and reliability if the transactions are flowing between instances of the same container type.B Easier to build a Shared Services infrastructure that can provide best practices, tools and expertise around HA/Management.... with a single type of container than a mix of multiple typesC  You’ll save on hardware costs with a homogenous environmentD  It’s a necessary step in our move toward adopting SOA

考题 单选题You work as the enterprise exchange administrator at Company.com.The Company.com network consists of a single Active Directory domain named Company.com.Company.com has an Exchange Server 2010 organization.Company.com has acquired a new client access server named -sr11.you have received instructions from the cio to make sure that the employees can access -sr11 by using outlook web app.What should you do?()A The best option is to run the Test-OwaConnectivity cmdlet in the Exchange Management Shell.B The best option is to view the session state settings for the Outlook Web Access virtual directory in the Internet Information Services (IIS) Manager.C The best option is to run a baseline scan in the Exchange Best Practices Analyzer.D The best option is to check the properties of the default Outlook Web App mailbox policy in the Exchange Management Console (EMC).

考题 单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A  RADIUS or LDAPB  an internal router running EIGRPC  Reverse Route Injection and OSPF or RIPv2D  the VPN appliance to be deployed in line with the firewall

考题 单选题When implementing best practices for IP Source Address Spoofing and Defeating Denial of Service Attacks with IP SourceAddress Spoofing, what RFC is commonly usedto protect your network?()A  RFC 1149B  RFC 3704C  RFC 1918D  RFC 2827

考题 单选题The Cisco network-based virtual firewall service solution helps service providers to deliver cost-effective, scalable, integrated security services for enterprise customers using Cisco platforms.What is a virtual firewall?()A  another name for a firewall deployed in routed modeB  another name for a firewall deployed in transparent modeC  a separation of multiple firewall security contexts on a single firewallD  a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

考题 单选题Which of the following is the primary motivation for using BGP between an Enterprise and its ISPs?()A To influence the choice of best path (best route) for at least some routesB To avoid having to configure static routesC To allow redistribution of BGP routes into the IGP routing protocolD To monitor the size of the Internet BGP table

考题 单选题What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()A RADIUS or LDAPB an internal router running EIGRPC Reverse Route Injection and OSPF or RIPv2D the VPN appliance to be deployed in line with the firewall

考题 多选题Router R1 sits at an Enterprise branch office, using both the Internet and a leased line to another Enterprise router for its two connectivity options back into the rest of the Enterprise network. The engineer planning for this branch decided to use the leased line for all Enterprise traffic, unless it fails, in which case the Internet connection should be used to pass traffic to the Enterprise. Which of the following is most likely to be useful on the branch router?()AIPsec tunnelBGRE tunnelCFloating stati c routeDAn IGP

考题 单选题The Cisco network-based virtual firewall service solution helps service providers to deliver costeffective, scalable, integrated security services for enterprise customers using Cisco platforms .What is a virtual firewall?()A another name for a firewall deployed in routed modeB another name for a firewall deployed in transparent modeC a separation of multiple firewall security contexts on a single firewallD a firewall that, when deployed in routed mode, can support up to 1000 VLANs per context

考题 单选题You are performing a test deployment of Microsoft Enterprise Desktop virtualization (MED-V) 2.0. You discover that applications deployed by using MED-V run much slower than expected. You need to recommend configuration changes to improve the performance of the MED-V workspace applications. Which configuration changes should you recommend?()A Disable cached mode in Outlook 2010B Add exclusions to Forefront EndPoint ProtectionC Add URL exclusions to the Forefront TMG ClientD Modify the network settings in SharePoint Workspace 2010