多項(xiàng)選擇題Which two of these correctly describe Fibre Channel?()

A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to 100 km before needing extenders


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two statements about Network Attached Storage are correct?()

A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.

2.單項(xiàng)選擇題Which statement about data center access layer design modes is correct?()

A. The access layer is the first oversubscription point in a data center design.
B. When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
C. When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
D. When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
E. The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.

3.單項(xiàng)選擇題Which statement correctly describes a situation in which VRFs are used in the data center?()

A. Partitioning of network resources is enabled.
B. VRFs cannot support path isolation from MAN/WAN designs.
C. VRFs cannot be used to map a virtualized data center to a MPLS implementation.
D. VRFs do not allow for the use of application services with multiple access topologies.
E. An access design using a VRF allows for an aggregation layer service module solution.

4.多項(xiàng)選擇題Which two statements correctly describe a situation in which an Active/Standby Service Module design is being used? ()

A. Troubleshooting is more complicated.
B. Service and switch modules are underutilized.
C. Layer 2 adjacency is required with the servers that use this design.
D. Layer 3 adjacency is required with the servers that use this design.
E. Load balancing will always occur across both access layer uplinks.

5.多項(xiàng)選擇題Which two design recommendations are most appropriate when EIGRP is the data center corerouting protocol? ()

A. Summarize data center subnets.
B. Use passive interfaces to ensure appropriate adjacencies.
C. Tune the EIGRP timers to enable EIGRP to achieve quicker convergence.
D. Adjust the default bandwidth value to ensure proper bandwidth on all links.
E. Advertise a default summary route into the data center core from the aggregation layer.

6.多項(xiàng)選擇題Which two design recommendations are most appropriate when OSPF is the data center core routing protocol? ()

A. Never use passive interfaces.
B. Use NSSA areas from the core down.
C. Use totally stub areas to stop type 3 LSAs.
D. Use the lowest Ethernet interface IP address as the router ID.
E. Tune OSPF timers to enable OSPF to achieve quicker convergence

7.單項(xiàng)選擇題Which of the following is a characteristic of a data center core?()

A. Server-to-server traffic always remains in the core layer.
B. The recommended practice is for the core infrastructure to be in Layer 3.
C. The boundary between Layer 2 and Layer 3 should be implemented in the aggregation layer.
D. The Cisco Express Forwarding hashing algorithm is the default, based on the IP address andLayer 4 port.
E. Core layer should run BGP along with an IGP because iBGP has a lower administrativedistance than any IGP.

8.多項(xiàng)選擇題Which two of these multicast deployments are most susceptible to attacks from unknown sources?()

A. ASM
B. BiDir PIM
C. PIM-SM RP
D. RP-Switchover
E. Source Specific Multicast

9.單項(xiàng)選擇題What is the default value of the SPT threshold in Cisco routers?()

A. 0
B. 1
C. 2
D. 4
E. 16
F. infinity

10.多項(xiàng)選擇題

Refer to the exhibit. Which two statements are correct regarding the creation of a multicas tdistribution tree? ()

A. Each router determines where to send the JOIN request.
B. The tree will be built based on the IP address of the E2 interface on router E
C. The best path to the source will be discovered in the unicast routing table on router B
D. The best path to the source will be discovered in the unicast routing table on router C
E. The best path to the source will be discovered in the unicast routing table on router E

最新試題

What is the traditional mode for a firewall?()

題型:?jiǎn)雾?xiàng)選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:?jiǎn)雾?xiàng)選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項(xiàng)選擇題

In which two locations in an enterprise network can an IPS sensor be placed? ()

題型:多項(xiàng)選擇題

At a certain customer’s site, a NAS is logically in the traffic path but not physically in the trafficpath. The NAS identifies clients by their IP addresses. In which access mode has this NAS beenconfigured to operate?()

題型:?jiǎn)雾?xiàng)選擇題

Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() 

題型:多項(xiàng)選擇題

During consultation, you find that a customer has only a single asset closet and is looking for asolution that is easy to deploy. Which NAS physical deployment model would you suggest to this customer?()

題型:?jiǎn)雾?xiàng)選擇題

Which two of these correctly describe asymmetric routing and firewalls? ()

題型:多項(xiàng)選擇題

Which statement about Fibre Channel communications is correct?()

題型:?jiǎn)雾?xiàng)選擇題

Which two statements about Network Attached Storage are correct?()

題型:多項(xiàng)選擇題