网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Refer to the exhibit. ROUTE.com is planning to implement load balancing for traffic between hosts on the 172.16.10.0/24 and 172.16.20./24 networks. You have been ask ed to review the implementation plan for this project. Which statement about the plan is true?()

A. It is complete as written.

B. It should include a task to configure EIGRP multipath equal to 2 on R1 and R4.

C. It should inc lude a task to implement OSPF because it handles unequal cost load balancing most efficiently using variance.

D. It should include a task that establishes a baseline before and after the configuration has been changed.


参考答案

更多 “ Refer to the exhibit. ROUTE.com is planning to implement load balancing for traffic between hosts on the 172.16.10.0/24 and 172.16.20./24 networks. You have been ask ed to review the implementation plan for this project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task to configure EIGRP multipath equal to 2 on R1 and R4.C. It should inc lude a task to implement OSPF because it handles unequal cost load balancing most efficiently using variance.D. It should include a task that establishes a baseline before and after the configuration has been changed. ” 相关考题
考题 An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?() A. Caching enginesB. QoSC. Traffic shapingD. Load balancing

考题 When load balancing traffic between two web servers,which of the following technologies provides the LOWEST cost solution?() A. Active/passive clusterB. Active/active clusterC. Log shippingD. DNS round robin

考题 Refer to the exhibit. ROUTE.com is planning to implement a secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on the 172.16.20./24 network. You have been asked to review the implementation and verification plans for this OSPF project. Which statement about the plan is true? ()A. It is complete as writtenB. It should include a task that verifie s that the interarea routes are using the proper MEDC. It should include a task that verifies that load sharing is active on R1 and R4D. It should include a task that verifies that all redundant links will become active when the primary links are sh ut down

考题 Refer to the exhibit. ROUTE.com is planning to implement a new secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on th e 172.16.20./24 network. You have been asked to review the implementation plan for the OSPF project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task that shuts down all unused interfaces.C. It sho uld include tasks that enable and verify OSPF authentication.D. It should include a task that establishes a file transfer baseline before and after the configuration is changed.

考题 Refer to the exhi bit. ROUTE.com is planning to implement load balancing for traffic between host on the 172.16.10.0/24 and 172.16.20./24 networks. You have been asked to review the implementation plan for this project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task to configure multipath to equal a value of 2 on R1 and R4.C. It should use a ping instead of a traceroute to validate that load balancing has been activated.D. It should conta in a task that documents the changes made to the configurations.

考题 Refer to the exhibit. How would you confirm on R1 that load balancing is actually occurring on the default - netw ork (0.0.0.0)?() A. Use ping and the show ip route command to confirm the timers for each default network resets to 0.B. Load balancing does not occur over default networks; the second route will only be used for failover.C. Use an extended ping al ong with repeated show ip route commands to confirm the gateway of last resort address toggles back and forth.D. Use the traceroute command to an address that is not explicitly in the routing table.

考题 Refer to the exhibit. You want to use all the routes in the EIGRP topology for IP load balancing. Which two EIGRP subcommands wou ld you use to accomplish this goal?() A. traffic - share balancedB. distanceC. maximum- pathsD. default - networkE. variance

考题 Refer to the exhibit. A client has asked you to consult on an eBGP loading question. Currently the AS 100 eBGP links have an average outbound load of 65% and 20% respectively. On further investigation, traffic from 10.10.24.0 accounts for 45%, and 10.10.25.0 and 10.10.32.0 accounts for 20% each of the outbound load. The customer wants to spread the load between the two eBGP links more evenly. The BGP attributes are currently set at their default values. If you are located at AS 100 and want to influence how AS 100 sends traffic to AS 200, what BGP attribute could you configure to cause AS 100 outbound traffic to load the eB GP links more evenly? ()A. On router A, set the default local - preference to 50.B. On router B, set the default metric to 150.C. On router B, configure a route map for 10.10.25.0/24 with a local preference of 150 linked to neighbor 192.168.30.2.D. On router B, set the default local -preference to 150.

考题 Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5

考题 Refer to the exhibit. You are the network administrator of the Route.com company. You have been tasked to implement a hub and spoke EIGRP topology over Frame Relay to provide connectivity between the networks at headquarters and all 300 spokes. Before you begin the actual implementation, which three pieces of information are more important to know than the others?()A. the Committed Information Rate of all the Frame Relay PVCsB. the Cisco IOS version running on all the routersC. the router model number of all the spoke routersD. the number of HQ networks connected behind the headquarter routersE. the routing policy, such as whether or not the spokes can be used as backup transient point between the two headquarter routers

考题 Refer to the exhibit. Which statement is true? () A. Only traffic with a destination from 10.10.0.0/19 will be permitted.B. Router RAR1 will accept only route 10.10.0.0/19 from its BGP neighbor.C. Only traffic going to 10.10.0.0/19 will be permitted.D. Router RAR1 will send only route 10.10.0.0/19 to its BGP neighbor.

考题 Which three best practices should be implemented at the campus backbone submodule to support the server farm module?() A. Implement highly redundant switching and links with no single points or paths of failure.B. Implement server load balancing.C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.D. Implement intrusion detection with automatic notification of intrusion attempts in place.

考题 Refer to the exhibit. What will happen to HTTP traffic coming from the Internet that is destined for 172.16.12.10 if the traffic is processed by this ACL?() A.Traffic will be dropped per line 30 of the ACL.B.Traffic will be accepted per line 40 of the ACL.C.Traffic will be dropped, because of the implicit deny all at the end of the ACL.D.Traffic will be accepted, because the source address is not covered by the ACL.

考题 Refer to the exhibit. What can be determined about the router from the console output?() A.No configuration file was found in NVRAM.B.No configuration file was found in flash.C.No configuration file was found in the PCMCIA card.D.Configuration file is normal and will load in 15 seconds.

考题 You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which routing protocols can satisfy this requirement?()A、RIP v1B、RIP v2C、IGRPD、EIGRPE、OSPFF、IS-IS

考题 Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()A、 Implement highly redundant switching and links with no single points or paths of failure.B、 Implement server load balancing.C、 Implement the Hot Standby Router Protocol (HSRP) for failover protection.D、 Implement intrusion detection with automatic notification of intrusion attempts in place.

考题 Prioritizing traffic between data and voice is defined as which of the following?()A、Caching enginesB、Proxy serverC、QoSD、Load balancing

考题 When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A、 Active/passive clusterB、 Active/active clusterC、 Log shippingD、 DNS round robin

考题 An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

考题 多选题You are operating a multi-vendor network and are considering adding redundancy at the access level. Which routing redundancy solution should you implement?()ABoth Gateway Load Balancing Protocoland Hot Stand by Router ProtocolBGateway Load Balancing ProtocolCVirtual Router Redundancy ProtocolDHot Stand by Router Protocol

考题 多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 单选题Refer to the exhibit. Which statement is true about a voice VLAN?()A  Physically the voice network and the data network are separate.B  The voice traffic will normally be on a different IP subnet than will the data traffic.C  End user intervention is necessary to place the phone into the proper VLAN.D  The same security policy should be implemented for both voice and data traffic.E  The data VLAN must be configured as the native VLAN.

考题 多选题You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which routing protocols can satisfy this requirement?()ARIP v1BRIP v2CIGRPDEIGRPEOSPFFIS-IS

考题 单选题When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A  Active/passive clusterB  Active/active clusterC  Log shippingD  DNS round robin