网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements about end-host mode in SAN connectivity in a Cisco UCS environment are true? ()
A

End-host mode is synonymous with NPV mode.

B

In end-host mode, only hard pinning of vHBAs to Fibre Channel uplink ports is allowed.

C

Making configuration changes between Fibre Channel switching mode and end-host mode is nondisruptive.

D

End-host mode is the default Fibre Channel switching mode.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements about end-host mode in SAN connectivity in a Cisco UCS environment are true? ()AEnd-host mode is synonymous with NPV mode.BIn end-host mode, only hard pinning of vHBAs to Fibre Channel uplink ports is allowed.CMaking configuration changes between Fibre Channel switching mode and end-host mode is nondisruptive.DEnd-host mode is the default Fibre Channel switching mode.” 相关考题
考题 Which two statements about workload capture and replay operations are true?() A. The clients must be created manually on the test machines to perform more realistic testing.B. Restart the database in RESTRICTED mode before beginning workload replay to enable a clean state for workload replay.C. Restart the database in RESTRICTED mode before beginning workload capture to enable a clean state for capturing the workload.D. The application state of the capture system must be identical to the application state of the replay system when the workload replay begins.

考题 Which two statements are true about InnoDB auto-increment locking?() A.The auto-increment lock can be a table-level lockB.InnoDB never uses table-level locksC.Some settings for innodb_autoinc_lock_mode can help reduce lockingD.InnoDB always protects auto-increment updates with a table-level lock

考题 Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.

考题 Which two statements are true about the configure exclusive command?() A. It allows users to retain all uncommitted changes when exiting exclusive configuration mode.B. It allows multiple users to edit private copies of the configuration concurrently.C. It causes the loss of all uncommitted changes when exiting exclusive configuration mode.D. It excludes other users from editing the configuration.

考题 Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.

考题 Which two statements correctly describe VTP?()A、Transparent mode always has a configuration revision number of 0.B、Transparent mode cannot modify a VLAN database.C、Client mode cannot forward received VTP advertisements.D、Client mode synchronizes its VLAN database from VTP advertisements.E、Server mode can synchronize across VTP domains.

考题 Which two statements about FCIP and iSCSI are correct?()A、 The FCIP stack supports file-level storage for remote devices.B、 Both require high throughput with low latency and low jitter.C、 The purpose of FCIP is to provide connectivity between host and storage.D、 The iSCSI stack supports block-level storage for remote devices.E、 The purpose of iSCSI is to provide connectivity between separate wide-area SANs.

考题 Given a Cisco Unified Computing System, which is a valid port type in end-host mode?()A、 ServerB、 End deviceC、 NodeD、 HostE、 Virtual

考题 Which two statements about SAN port channels configured on Cisco Nexus 5000 Series switches are true? ()  A、 The bring up protocol automatically detects and overrides any misconfiguration.B、 You can manually configure channel groups, or they can be automatically created.C、 Changes in configuration to the SAN port channel interface must also be made to all members of the channel group.D、 The port channel protocol uses the exchange fabric parameters command to communicate across peer ports in an ISL.E、 The port channel protocol ensures that a set of ports is eligible to be part of the same SAN port channel.

考题 Which three statements about firewall modes are correct? ()A、 A firewall in routed mode has one IP addressB、 A firewall in transparent mode has one IP addressC、 In routed mode, the firewall is considered to be a Layer 2 dewD、 In routed mode, the firewall is considered to be a Layer 3 deviceE、 In transparent mode, the firewall is considered to be a Layer 2 deviceF、 In transparent mode, the firewall is considered to be a Layer 3 device

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which of the following expansion cards should be installed into a server to provide iSCSI SAN connectivity? ()A、 HBAB、 PBXC、 VoIPD、 NIC

考题 You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()A、 In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.B、 In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.C、 In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).D、 In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.E、 In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.F、 In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

考题 Which two statements about end-host mode in SAN connectivity in a Cisco UCS environment are true? ()A、 End-host mode is synonymous with NPV mode.B、 In end-host mode, only hard pinning of vHBAs to Fibre Channel uplink ports is allowed.C、 Making configuration changes between Fibre Channel switching mode and end-host mode is nondisruptive.D、 End-host mode is the default Fibre Channel switching mode.

考题 Which three statements are possible causes for the "fltAdaptorHostIfLink-down" fault in UCS Manager? ()A、 The fabric interconnect is in the end-host mode, and all uplink ports have failed.B、 The server port to which the adapter is pinned has failed.C、 A transient error has caused the link to fail.D、 The fabric interconnect is in the switch mode, and all uplink ports have failed.E、 The link for a network-facing host interface is missing.

考题 Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.

考题 Which one of the following statements about the TNSPING utility is correct?()A、It helps you to determine whether or not the Oracle database is running.B、It requires the username and password to check the connectivity of the service.C、It does not require the username and password to check the connectivity of the service.D、It establishes a session with the database and checks the connectivity of the service.

考题 单选题Given a Cisco Unified Computing System, which is a valid port type in end-host mode?()A  ServerB  End deviceC  NodeD  HostE  Virtual

考题 多选题Which three statements are possible causes for the "fltAdaptorHostIfLink-down" fault in UCS Manager? ()AThe fabric interconnect is in the end-host mode, and all uplink ports have failed.BThe server port to which the adapter is pinned has failed.CA transient error has caused the link to fail.DThe fabric interconnect is in the switch mode, and all uplink ports have failed.EThe link for a network-facing host interface is missing.

考题 多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

考题 多选题Which two statements are true about the configure exclusive command?()AIt allows users to retain all uncommitted changes when exiting exclusive configuration mode.BIt allows multiple users to edit private copies of the configuration concurrently.CIt causes the loss of all uncommitted changes when exiting exclusive configuration mode.DIt excludes other users from editing the configuration.

考题 多选题Which three statements about firewall modes are correct? ()AA firewall in routed mode has one IP addressBA firewall in transparent mode has one IP addressCIn routed mode, the firewall is considered to be a Layer 2 dewDIn routed mode, the firewall is considered to be a Layer 3 deviceEIn transparent mode, the firewall is considered to be a Layer 2 deviceFIn transparent mode, the firewall is considered to be a Layer 3 device

考题 多选题Which two statements about FCIP and iSCSI are correct?()AThe FCIP stack supports file-level storage for remote devices.BBoth require high throughput with low latency and low jitter.CThe purpose of FCIP is to provide connectivity between host and storage.DThe iSCSI stack supports block-level storage for remote devices.EThe purpose of iSCSI is to provide connectivity between separate wide-area SANs.

考题 多选题Which two statements correctly describe VTP?()ATransparent mode always has a configuration revision number of 0.BTransparent mode cannot modify a VLAN database.CClient mode cannot forward received VTP advertisements.DClient mode synchronizes its VLAN database from VTP advertisements.EServer mode can synchronize across VTP domains.

考题 多选题You need to determine the correct wireless LAN topology for use in the Company network.  Which  three statements are true about the various WLAN topologies?()AIn ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile  clients connect directly without an intermediate access point.BIn Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use  a single access point for connecting to each other or to wired network resources.CIn Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more  Basic Service Sets are connected by a common distribution system (DS).DIn Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which  mobile clients connect directly without an intermediate access point.EIn ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a  single AP for connecting to each other or to wired network resources.FIn ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic  Service Sets are connected by a common distribution system (DS)

考题 多选题Which two statements are true about InnoDB auto-increment locking?()AThe auto-increment lock can be a table-level lockBInnoDB never uses table-level locksCSome settings for innodb_autoinc_lock_mode can help reduce lockingDInnoDB always protects auto-increment updates with a table-level lock

考题 单选题Which one of the following statements about the TNSPING utility is correct?()A It helps you to determine whether or not the Oracle database is running.B It requires the username and password to check the connectivity of the service.C It does not require the username and password to check the connectivity of the service.D It establishes a session with the database and checks the connectivity of the service.