网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Virtual PortChannels (vPCs) allow links that are physically connected to two different Cisco switches to appear to a third downstream device as coming from a single device and as part of a single port channel. Which of the following are components of a Virtual PortChannel system? ()
A

Two peer devices: the vPC peers of which one is primary and one is secondary and are part of a vPC domain.

B

A Layer 3 Gigabit Ethernet link called peer-keepalive link to resolve dual-active scenarios

C

A redundant 10 Gigabit Ethernet PortChannel called a peer link to carry traffic from one system to the other when needed

D

vPC member ports forming the PortChannel

E

A dot1q trunk between the vPC peers

F

A management port that can be used as peer-keepalive link to resolve dual-active scenarios.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Virtual PortChannels (vPCs) allow links that are physically connected to two different Cisco switches to appear to a third downstream device as coming from a single device and as part of a single port channel. Which of the following are components of a Virtual PortChannel system? ()ATwo peer devices: the vPC peers of which one is primary and one is secondary and are part of a vPC domain.BA Layer 3 Gigabit Ethernet link called peer-keepalive link to resolve dual-active scenariosCA redundant 10 Gigabit Ethernet PortChannel called a peer link to carry traffic from one system to the other when neededDvPC member ports forming the PortChannelEA dot1q trunk between the vPC peersFA management port that can be used as peer-keepalive link to resolve dual-active scenarios.” 相关考题
考题 You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)A.Configure the IIS virtual directory to allow URL queries.B.Configure the IIS virtual directory to allow template queries.C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.

考题 Which configuration component is required to allow a PPP over ATM client to connect to one virtual router for a particular session and to a different virtual router for another session?() A. profileB. domain mapC. IP access-routeD. static IP addressing

考题 Ezonexam has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?A.VTP will allow physically redundant links while preventing switching loopsB.VTP will allow switches to share VLAN configuration informationC.VTP will allow a single port to carry information to more than one VLAND.VTP will allow for routing between VLANsE.None of the above

考题 You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 You are the Cisco Network Designer in Cisco.com. What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?() A. InterSwitch LinkB. Virtua LANC. Virtual Output QueuingD. virtual storage area network

考题 You have finished physically installing an access point on the ceiling at your office. At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()A. AESB. PSKC. SSIDD. TKIPE. WEP

考题 What can be done to secure the virtual terminal interfaces on a router?() A. Administratively shut down the interface.B. Physically secure the interface.C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.D. Configure a virtual terminal password and login process.E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()A.AESB.PSKC.SSIDD.TKIPE.WEP

考题 What is the function performed by LSA Type 1?()A、Create virtual links.B、Advertise external prefixes.C、Summarize routes between areas.D、Advertise a router's interfaces and metrics.

考题 You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 Several links have been broken so th at for the next day or two, what was formerly a contiguous area 0 has been broken into two parts. However, both parts of area 0 have working links into area 1 using routers with RID 1.1.1.1 and 2.2.2.2. Which answers list the command on the router with RID 1.1.1.1 to create a virtual link to help solve this temporary problem?()A、area 0 virtual - link 2.2.2.2B、area 1 virtual - link 2.2.2.2C、area 0 source - rid 1.1.1.1 dest - rid 2.2.2.2D、virtual - link transit - area 1 RID 2.2.2.2

考题 A virtual port channel (vPC) allows links that are physically connected to two different Cisco Nexus devices to appear as a single port channel to a third device. Which are the mandatory steps for configuring vPC? ()   A、 Enable feature vPCB、 Define domainsC、 Establish peer keepalive connectivityD、 Create a peer linkE、 Configure the peer link as a trunk portF、 Create port channels and vPCsG、 Define port channel load-balancing methodH、 Make sure configurations are consistent

考题 Virtual PortChannels (vPCs) allow links that are physically connected to two different Cisco switches to appear to a third downstream device as coming from a single device and as part of a single port channel. Which of the following are components of a Virtual PortChannel system? ()A、 Two peer devices: the vPC peers of which one is primary and one is secondary and are part of a vPC domain.B、 A Layer 3 Gigabit Ethernet link called peer-keepalive link to resolve dual-active scenariosC、 A redundant 10 Gigabit Ethernet PortChannel called a peer link to carry traffic from one system to the other when neededD、 vPC member ports forming the PortChannelE、 A dot1q trunk between the vPC peersF、 A management port that can be used as peer-keepalive link to resolve dual-active scenarios.

考题 Which configuration component is required to allow a PPP over ATM client to connect to one virtual router for a particular session and to a different virtual router for another session?()A、profileB、domain mapC、IP access-routeD、static IP addressing

考题 You are the Cisco Network Designer in Cisco.com. What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()A、 InterSwitch LinkB、 Virtua LANC、 Virtual Output QueuingD、 virtual storage area network

考题 Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command

考题 Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command.

考题 What can be done to secure the virtual terminal interfaces on a router? ()A、Administratively shut down the interface.B、Physically secure the interface.C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.D、Configure a virtual terminal password and login process.E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

考题 You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()A、AESB、PSKC、SSIDD、TKIPE、WEP

考题 Which of the following network devices would MOST likely be installed on a network to helpreduce broadcast traffic and to allow individual virtual networks?()A、SwitchB、RepeaterC、HubD、WAP

考题 多选题A virtual port channel (vPC) allows links that are physically connected to two different Cisco Nexus devices to appear as a single port channel to a third device. Which are the mandatory steps for configuring vPC? ()AEnable feature vPCBDefine domainsCEstablish peer keepalive connectivityDCreate a peer linkEConfigure the peer link as a trunk portFCreate port channels and vPCsGDefine port channel load-balancing methodHMake sure configurations are consistent

考题 单选题You have a Windows Server 2008 R2 Hyper-V server with a single network adapter that is connected to a virtual network. The virtual network is configured as External. Virtual machines (VMs) running on the server are not able to communicate with the host server over the network. You need to ensure that VMs running on the server are able to communicate with the host server over the network.  In Virtual Network Manager,what should you do?()A Select the Internal only connection type.B Select the Private virtual machine network connection type.C Select the Allow management operating system to share this network adapter check box.D Clear the Allow management operating system to share this network adapter check box.

考题 单选题You are the Cisco Network Designer in Cisco.com. What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()A  InterSwitch LinkB  Virtua LANC  Virtual Output QueuingD  virtual storage area network

考题 单选题You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()A AESB PSKC SSIDD TKIPE WEP

考题 单选题Several links have been broken so th at for the next day or two, what was formerly a contiguous area 0 has been broken into two parts. However, both parts of area 0 have working links into area 1 using routers with RID 1.1.1.1 and 2.2.2.2. Which answers list the command on the router with RID 1.1.1.1 to create a virtual link to help solve this temporary problem?()A area 0 virtual - link 2.2.2.2B area 1 virtual - link 2.2.2.2C area 0 source - rid 1.1.1.1 dest - rid 2.2.2.2D virtual - link transit - area 1 RID 2.2.2.2

考题 单选题Which statement accurately describes a benefit provided by VTP()。A VTP allows routing between VLANs.B VTP allows a single port to carry information to more than one VLAN.C VTP allows physically redundant links while preventing switching loops.D VTP allows switches to share VLAN configuration information.

考题 单选题Which statement accurately describes a benefit provided by VTP?()A VTP allows routing between VLANs.B VTP allows a single port to carry information to more than one VLANC VTP allows physically redundant links while preventing switching loops.D VTP allows switches to share VLAN configuration information.