网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()
A

 RFP

B

 RFC

C

 SLC/SLA

D

 SOW


参考答案

参考解析
解析: 暂无解析
更多 “单选题When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A  RFPB  RFCC  SLC/SLAD  SOW” 相关考题
考题 When a sentence changes from a statement to a general/ special question, which movement is struc-turally required A NP–movement/WH-movementB NP–movement/Aux-movementC AUX-movement/WH–movementD WH–movement/AUX-movement

考题 Which of the following statements describe the use of the keywordstatic?a) Within the body of a function: A static variable maintains its valuebetween function revocationsb) Within a module: A static variable is accessible by all functionswithin that modulec) Within a module: A static function can only be called by otherfunctions within that module

考题 What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?() A. determine types of protocols to be supportedB. determine the environment in which the router will be usedC. select the number of WAN ports requiredD. select the number of LAN ports required

考题 When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?() A.RFPB.RFCC.SLC/SLAD.SOW

考题 Wh.ch version of spanning tree is recommended for the enterprise campus?()A、 CSTB、 MSTC、 STPD、 PVST+E、 PVRST+

考题 Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()A、 FHRP to remote branches.B、 Layer 3 MPLS VPNs routing.C、 Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.D、 Intrusion prevention, QoS, and stateful firewall support network wide.

考题 If the default VDC is configured to limit resources to a specific module type, what happens when a module that does not match the resource type is installed?()     A、 The module is powered up, and interfaces are in an "admin down" state.B、 The module is denied power, and a syslog message is generated.C、 The module is powered up, and interfaces are allocated to VDC0.D、 The module is powered up, and interfaces are allocated to VDC100.

考题 When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A、 Filtering is only useful when combined with route summarizationB、 It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC、 IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD、 The primary limitation of router filtering is that it can only be applied on outbound updates

考题 When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A、 It is recommended to place the VPN termination device in line with the Enterprise Edge 1B、 Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC、 VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD、 Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A、 Routed mode requires the ACE run OSPF or EIGRPB、 Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC、 Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD、 One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

考题 Where does Layer2 de-encapsulation occur on the ERX Edge Router?()A、on the SRPB、on the I/O adapterC、on the egress line moduleD、on the ingress line module

考题 When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A、RFPB、RFCC、SLC/SLAD、SOW

考题 A banking customer deployed an IBM BladeCenter chassis with one Brocade 8Gb SAN switch module. The customer requires an 8Gb uplink or higher. Which configuration will meet this request?()A、Brocade Enterprise 20-port 8Gb SAN switch module B、Brocade 20-port 8Gb SAN switch module and Brocade Advanced Performance Monitoring for IBM BladeCenter share C、Brocade Enterprise 10-port 8Gb SAN switch module D、Brocade 10-port 8Gb SAN switch module and Brocade Advanced Performance Monitoring for IBM BladeCenter

考题 When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()A、for a SAN768B DirectorB、for a second TS3500 Tape LibraryC、for a second EXP5060 Expansion UnitD、for an additional DS8300 Expansion Frame

考题 A customer has two Ethernet Switch Modules installed in an IBM BladeCenter Enterprise chassis. The modules were configured identically. The Ethernet module in bay one was inadvertenly reset to factory defaults. Which solution returns the module to the customer-specific configuration?()A、Back up the configuration from Ethernet module in bay 2 and restore it to the module in Bay 1 using the switch CLI or Web interface B、Swap the modules, which will automatically resynch the settings stored in the Advanced Management Module C、Back up the configuration of the Ethernet module in bay one and restore it to the Ethernet module in bay two using the AMM D、Restore the configuration from NVRAM using the Switch Module Web interface

考题 When a critical error occurs, which module in Enterprise Manager will automatically collect diagnostics data from WebLogic Server?()A、ReportsB、ComplianceC、Support WorkbenchD、Asset DiscoveryE、visual creation of JDBC DataSource object to Oracle RAC

考题 单选题When a critical error occurs, which module in Enterprise Manager will automatically collect diagnostics data from WebLogic Server?()A ReportsB ComplianceC Support WorkbenchD Asset DiscoveryE visual creation of JDBC DataSource object to Oracle RAC

考题 单选题When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()A for a SAN768B DirectorB for a second TS3500 Tape LibraryC for a second EXP5060 Expansion UnitD for an additional DS8300 Expansion Frame

考题 单选题Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()A  Routed mode requires the ACE run OSPF or EIGRPB  Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destinationC  Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANsD  One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE

考题 单选题What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()A  determine types of protocols to be supportedB  determine the environment in which the router will be usedC  select the number of WAN ports requiredD  select the number of LAN ports required

考题 单选题What is the first step that you would use Cisco Product Advisor for when selecting a router for an Edge solution?()A determine types of protocols to be supportedB determine the environment in which the router will be usedC select the number of WAN ports requiredD select the number of LAN ports required

考题 单选题When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()A  It is recommended to place the VPN termination device in line with the Enterprise Edge 1B  Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deploymentC  VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in placeD  Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7

考题 单选题If the default VDC is configured to limit resources to a specific module type, what happens when a module that does not match the resource type is installed?()A  The module is powered up, and interfaces are in an admin down state.B  The module is denied power, and a syslog message is generated.C  The module is powered up, and interfaces are allocated to VDC0.D  The module is powered up, and interfaces are allocated to VDC100.

考题 单选题Wh.ch version of spanning tree is recommended for the enterprise campus?()A  CSTB  MSTC  STPD  PVST+E  PVRST+

考题 单选题Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()A  FHRP to remote branches.B  Layer 3 MPLS VPNs routing.C  Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.D  Intrusion prevention, QoS, and stateful firewall support network wide.

考题 单选题When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()A  Filtering is only useful when combined with route summarizationB  It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networksC  IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updatesD  The primary limitation of router filtering is that it can only be applied on outbound updates

考题 多选题When designing the IP routing for the Enterprise Campus network, which of these following twoiBGB considerations should be taken into account?()AiBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetworkBiBGP requires a full mesh of eBGP peersCRouters will not advertise iBGP learned routers to other iBGP peers.DThe use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGPEiGBP peers do not add any information to the AS path