网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Refer to the exhi bit. ROUTE.com is planning to implement load balancing for traffic between host on the 172.16.10.0/24 and 172.16.20./24 networks. You have been asked to review the implementation plan for this project. Which statement about the plan is true?()

A. It is complete as written.

B. It should include a task to configure multipath to equal a value of 2 on R1 and R4.

C. It should use a ping instead of a traceroute to validate that load balancing has been activated.

D. It should conta in a task that documents the changes made to the configurations.


参考答案

更多 “ Refer to the exhi bit. ROUTE.com is planning to implement load balancing for traffic between host on the 172.16.10.0/24 and 172.16.20./24 networks. You have been asked to review the implementation plan for this project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task to configure multipath to equal a value of 2 on R1 and R4.C. It should use a ping instead of a traceroute to validate that load balancing has been activated.D. It should conta in a task that documents the changes made to the configurations. ” 相关考题
考题 An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?() A. Caching enginesB. QoSC. Traffic shapingD. Load balancing

考题 When load balancing traffic between two web servers,which of the following technologies provides the LOWEST cost solution?() A. Active/passive clusterB. Active/active clusterC. Log shippingD. DNS round robin

考题 Refer to the exhibit. ROUTE.com is planning to implement a secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on the 172.16.20./24 network. You have been asked to review the implementation and verification plans for this OSPF project. Which statement about the plan is true? ()A. It is complete as writtenB. It should include a task that verifie s that the interarea routes are using the proper MEDC. It should include a task that verifies that load sharing is active on R1 and R4D. It should include a task that verifies that all redundant links will become active when the primary links are sh ut down

考题 Refer to the exhibit. ROUTE.com is planning to implement a new secure OSPF network to support traffic between clients on the 172.16.10.0/24 network and the file server on th e 172.16.20./24 network. You have been asked to review the implementation plan for the OSPF project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task that shuts down all unused interfaces.C. It sho uld include tasks that enable and verify OSPF authentication.D. It should include a task that establishes a file transfer baseline before and after the configuration is changed.

考题 Refer to the exhibit. ROUTE.com is planning to implement load balancing for traffic between hosts on the 172.16.10.0/24 and 172.16.20./24 networks. You have been ask ed to review the implementation plan for this project. Which statement about the plan is true?()A. It is complete as written.B. It should include a task to configure EIGRP multipath equal to 2 on R1 and R4.C. It should inc lude a task to implement OSPF because it handles unequal cost load balancing most efficiently using variance.D. It should include a task that establishes a baseline before and after the configuration has been changed.

考题 Refer to the exhibit. How would you confirm on R1 that load balancing is actually occurring on the default - netw ork (0.0.0.0)?() A. Use ping and the show ip route command to confirm the timers for each default network resets to 0.B. Load balancing does not occur over default networks; the second route will only be used for failover.C. Use an extended ping al ong with repeated show ip route commands to confirm the gateway of last resort address toggles back and forth.D. Use the traceroute command to an address that is not explicitly in the routing table.

考题 Refer to the exhibit. You want to use all the routes in the EIGRP topology for IP load balancing. Which two EIGRP subcommands wou ld you use to accomplish this goal?() A. traffic - share balancedB. distanceC. maximum- pathsD. default - networkE. variance

考题 Refer to the exhibit. ROUTE.com has just implemented this EIGRP network. A network administrator came to you for advice while trying to implement load balancing across part of their EIGRP network. If the variance value is configured as 2 on all routers and all o ther metric and K values are configured to their default values, traffic from the Internet to the data center will be load balanced across how many paths? ()A. 1B. 2C. 3D. 4E. 5

考题 Which three best practices should be implemented at the campus backbone submodule to support the server farm module?() A. Implement highly redundant switching and links with no single points or paths of failure.B. Implement server load balancing.C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.D. Implement intrusion detection with automatic notification of intrusion attempts in place.

考题 What is Phantom RP used for?()A、it is used for load balancing in bidirectional PIMB、it is used for redundancy in bidirectional PIMC、it is used for redundancy in PIM-SMD、it is used for load balancing in PIM-SM

考题 It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A、 single layer of firewallingB、 multiple layers of firewallingC、 firewall connections in either an active or standby stateD、 an architecture in which all traffic between firewalls goes through application-specific servers

考题 You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which routing protocols can satisfy this requirement?()A、RIP v1B、RIP v2C、IGRPD、EIGRPE、OSPFF、IS-IS

考题 You need to decide on the best router redundancy protocol to use in the Company network.  Which  two statements are true about HSRP, VRRP, and GLBP?()A、 GLBP and VRRP allow for MD5 authentication, whereas HSRP does not.B、 HSRP allows for multiple upstream active links being simultaneously used, whereas GLBP  does not.C、 GLBP allows for router load balancing of traffic from a network segment without the different  host IP configurations required to achieve the same results with HSRP.D、 Unlike HSRP and VRRP, GLBP allows automatic selection and simultaneous use of multiple  available gateways.E、 GLBP allows for router load balancing of traffic from a network segment by utilizing the creation  of multiple standby groups.

考题 Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()A、 Implement highly redundant switching and links with no single points or paths of failure.B、 Implement server load balancing.C、 Implement the Hot Standby Router Protocol (HSRP) for failover protection.D、 Implement intrusion detection with automatic notification of intrusion attempts in place.

考题 Prioritizing traffic between data and voice is defined as which of the following?()A、Caching enginesB、Proxy serverC、QoSD、Load balancing

考题 When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A、 Active/passive clusterB、 Active/active clusterC、 Log shippingD、 DNS round robin

考题 An administrator is implementing a second server due to the increased usage. Which of the following optimization techniques is the administrator using?()A、Caching enginesB、QoSC、Traffic shapingD、Load balancing

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.D、 Add the port rule through Network Connections Properties on each node.

考题 Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()A、Log on to one of the cluster nodes and run the wlbs disable all command.B、Open the Network Load Balancing Clusters console and delete the default port rules.C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a four-node Network Load Balancing cluster. All nodes run Windows Server 2003. The cluster has converged successfully. You use Network Load Balancing Manager on the default host to configure all nodes of the cluster.   The nodes have a single network adapter and are connected to the same switching hub device.   Administrators of non-cluster servers that are connected to the same switching hub device report that their servers receive traffic that is destined for the cluster nodes. Receiving this additional network traffic impairs the network performance of the non-cluster servers.   You need to ensure that traffic destined for only the cluster nodes is not sent to all ports of the switching hub device.  You do not want to move the cluster to another switching hub device.   What should you do? ()A、 On one node, run the nlb.exe reload command.B、 On each node, run the wlbs.exe drainstop command.C、 Use Network Load Balancing Manager to enable Internet Group Management Protocol (IGMP) support on the cluster.D、 Use Network Load Balancing Manager to add a second cluster IP address.

考题 You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. You work in a company named Wiikigo, Ltd. and there is a two-node Network Load Balancing cluster. Onlythe intranet Web site will be provided with the high availability and load balancing by the cluster. Thecompany names the cluster as web.wiikigo.com. You find a problem that the Network Load Balancingcluster can be seen in the network neighborhood by the Wiikigo users. And the users can utilize the web.wiikigo.com name to get access to various services. The web.wiikigo.com Network Load Balancing clusteris set with only one port rule. Since you are the technical support, you are required have the web.wiikigo.com Network Load Balancing cluster configured to receive only HTTP traffic. Which two actions should be performed to achieve the goal?()A、To achieve the goal, the Network Load Balancing Clusters console should be opened and a new Allow rule should be created for TCP port 80.B、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rule should be modified to a disabled port range rule.C、To achieve the goal, one of the cluster nodes should be logged on to and the wlbs disable all command should be run.D、To achieve the goal, the Network Load Balancing Clusters console should be opened and the default port rules should be deleted.

考题 多选题Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()ACreate a new rule for TCP port 80 by using the Network Load Balancing Cluster consoleBRun the wlbs disable command on the cluster nodesCAssign a unique port rule for NLB cluster by using the NLB Cluster consoleDDelete the default port rules through Network Load Balancing Cluster console

考题 多选题You are operating a multi-vendor network and are considering adding redundancy at the access level. Which routing redundancy solution should you implement?()ABoth Gateway Load Balancing Protocoland Hot Stand by Router ProtocolBGateway Load Balancing ProtocolCVirtual Router Redundancy ProtocolDHot Stand by Router Protocol

考题 多选题Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()ALog on to one of the cluster nodes and run the wlbs disable all command.BOpen the Network Load Balancing Clusters console and delete the default port rules.COpen the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.DOpen the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

考题 单选题It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()A  single layer of firewallingB  multiple layers of firewallingC  firewall connections in either an active or standby stateD  an architecture in which all traffic between firewalls goes through application-specific servers

考题 多选题You need to configure a single router into load balancing traffic across 4 unequal cost paths. Which routing protocols can satisfy this requirement?()ARIP v1BRIP v2CIGRPDEIGRPEOSPFFIS-IS

考题 单选题When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A  Active/passive clusterB  Active/active clusterC  Log shippingD  DNS round robin