网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which two design concerns must be addressed when designing a multicast implementation?()

A. only the low-order 23 bits of the MAC address are used to map IP addresses

B. only the low-order 24 bits of the MAC address are used to map IP addresses

C. only the high-order 23 bits of the MAC address are used to map IP addresses

D. only the low-order 23 bits of the IP address are used to map MAC addresses

E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses

F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses


参考答案

更多 “ Which two design concerns must be addressed when designing a multicast implementation?() A. only the low-order 23 bits of the MAC address are used to map IP addressesB. only the low-order 24 bits of the MAC address are used to map IP addressesC. only the high-order 23 bits of the MAC address are used to map IP addressesD. only the low-order 23 bits of the IP address are used to map MAC addressesE. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addressesF. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses ” 相关考题
考题 Which two requirements would lead towards a high availability solution?() A.When uptime is criticalB.When data must be refactoredC.When application concurrency is staticD.When data loss is unacceptableE.When application is a single point of failure

考题 When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates

考题 Which two statements are true about the rendezvous poin t (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution tree.B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).C、The multicast receivers must register with the RP to form the multicast distribution tree.D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).E、An RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 When delivering the results of a Solutions Recommendation, which two of the following components should be included in the solutions presentation?()A、additional partner servicesB、the Value AssessmentC、the Discovery GuideD、the benefits of your solutionE、employee concerns

考题 Which two statements are tru e about the rendezvous point (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution treeB、An RP is required only in networks running Protocol Independent Multicast dense mode ( PIM DM)C、The multicast receivers must register with the RP to form the multicast distribution treeD、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM)E、An RP is required only in networks running Pro tocol Independent Multicast sparse - dense mode (PIM - SDM)F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP

考题 Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()A、 OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformanceB、 IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider supportC、 QoS requirements with MPLS-VPN must be implemented by the service providerD、 Hierarchical VPLS designs are the least scalableE、 IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required

考题 When configuring a wlan controller for a voice application using cisco 7920 wireless ip phones. which two general control settings should you select?()A、multicast onB、aggressive load balancing offC、multicast offD、ap fallback onE、aggressive load balancing onF、ap fallback off

考题 In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()A、Multicast Source Discovery Protocol mesh-groups must be configured between the two anycast RPs.B、The RPs must be within the same IGP domain.C、Multicast Source Discovery Protocol must be configured between the two anycast RPs.D、The two anycast RPs must be IBGP peers.

考题 When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones,which two general control settings should you select?()A、Aggressive Load Balancing onB、Aggressive Load Balancing offC、Multicast onD、Multicast offE、AP Fallback onF、AP Fallback off

考题 In order to configure two routers as anycast RPs,which of these requirements,at a minimum, must be satisfied?()A、Multicast Source Discovery Protocol mesh-groups must be configured between the two anycast RPs.B、The RPs must be within the same IGP domain.C、Multicast Source Discovery Protocol must be configured between the two anycast RPs.D、The two anycast RPs must be IBGP peers.

考题 Which three of the following are organizational objectives that should be addressed when developing a new VLAN implementation plan? ()A、network managementB、improving QoSC、determining budgetD、reducing costsE、increasing competitivenessF、improving customer support

考题 Which two of these are characteristics of multicast routing? ()A、 multicast routing uses RPFB、 multicast routing is connectionless.C、 In multicast routing, the source of a packet is known.D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpathE、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

考题 Which two statements are true about the rendezvo us point (RP) in a multicast network?()A、The multicast sources must register with the RP to form the multicast distribution tree.B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).C、The mu lticast receivers must register with the RP to form the multicast distribution tree.D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).E、An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization

考题 You deployed a Java EE Shared Library and want to use it from an application that is also deployed on the same cluster.    Which two manifest attributes must be specified at a minimum with corresponding values in the deployment descriptor of the application that requires?()A、Implementation-VersionB、Specification-VersionC、Extension-Name  D、Specification-VendorE、Implementation-Vendor

考题 Which two requirements would lead towards a high availability solution?()A、When uptime is criticalB、When data must be refactoredC、When application concurrency is staticD、When data loss is unacceptableE、When application is a single point of failure

考题 You are designing a DNS implementation strategy for the network.  Which two zone types should you use?()A、Reverse lookup zonesB、Standard primary zonesC、Standard secondary zonesD、Active Directory-integrated zones

考题 单选题You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()A Encrypt customer information when it is stored and when it is being transmittedB Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter networkC Encrypt all marketing information on file servers and client computersD Require encrypted connections to all file servers

考题 多选题Which two design concerns must be addressed when designing a multicast implementation?()Aonly the low-order 23 bits of the MAC address are used to map IP addressesBonly the low-order 24 bits of the MAC address are used to map IP addressesConly the high-order 23 bits of the MAC address are used to map IP addressesDonly the low-order 23 bits of the IP address are used to map MAC addressesEthe 0x01004f MAC address prefix is used for mapping IP addresses to MAC addressesFthe 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses

考题 多选题Which two statements are true about the rendezvous poin t (RP) in a multicast network?()AThe multicast sources must register with the RP to form the multicast distribution tree.BAn RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).CThe multicast receivers must register with the RP to form the multicast distribution tree.DAn RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).EAn RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).FTo form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 多选题Which three of the following are organizational objectives that should be addressed when developing a new VLAN implementation plan? ()Anetwork managementBimproving QoSCdetermining budgetDreducing costsEincreasing competitivenessFimproving customer support

考题 多选题When delivering the results of a Solutions Recommendation, which two of the following components should be included in the solutions presentation?()Aadditional partner servicesBthe Value AssessmentCthe Discovery GuideDthe benefits of your solutionEemployee concerns

考题 多选题You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()AMicrosoft System Center Operations ManagerBMicrosoft System Center Virtual Machine ManagerCMicrosoft System Center Data Protection ManagerDMicrosoft System Center Configuration Manager

考题 多选题When supporting multiple authentication domains, the domain map must be configured with which two options?()AhostnameBstatic routeCvirtual routerDloopback reference

考题 多选题Which two statements are true about the rendezvo us point (RP) in a multicast network?()AThe multicast sources must register with the RP to form the multicast distribution tree.BAn RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).CThe mu lticast receivers must register with the RP to form the multicast distribution tree.DAn RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).EAn RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).FTo form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

考题 多选题Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()AOSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformanceBIP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider supportCQoS requirements with MPLS-VPN must be implemented by the service providerDHierarchical VPLS designs are the least scalableEIGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required

考题 多选题When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()Aa list of existing network applications currently in use on the networkBnetwork audit results to uncover any potential security holesCa planned Layer 2 design solutionDa proof-of-concept planEdevice configuration templates