單項選擇題

As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology.
What is most probably the reason for that?()

A. Content pre-positioning
B. Automatic discovery of Cisco WAEs
C. Comprehensive logs, reports, and graphs
D. Remote scheduling of software distribution


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題

Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation,
which three of the following steps are necessary to take?()

A. Start LDP.
B. Enable CEF switching.
C. Configure conditional label advertising.
D. Enable label switching on frame mode interfaces.
E. disable IP TTL propagation
F. configure conditional label advertising

2.單項選擇題What is the default severity level of syslog trap messages?()

A.Warnings(severity=4)
B.Errors(severity=3)
C.notifications(severity=5)
D.informational(severity=6)

3.單項選擇題

As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command.
Which of the following statement will answer his quest|on?()

A. Informational and debug messages are logged to the syslog server.
B. All messages are sent to the logging host, where selections are made.
C. An information trap is sent to the SNMP server.
D. All messages from emergencies to informational are sent to the logging host.

4.單項選擇題There are seven basic steps of the core baseline process. Which one comes in the end? ()

A. Verify that SNMP MIB is supported in the relevant core device.
B. Implement monitoring using SNMP or RMON.
C. Implement threshold monitoring using RMON.
D. Poll and record specific SNMP MIB objects from the device.

5.單項選擇題There are seven basic steps of the core baseline process. Which one takes place first?()

A. Implement threshold monitoring using RMON.
B. Poll and record specific SNMP MIB objects from the device
C. Verify that the SNMP MIB is supported in the relevant core device.
D. Implement monitoring using SNMP or RMON.

7.單項選擇題As there are several logging modes, which mode will a CIS router use when it stores log messages in Random Access Memory?()

A. syslog logging
B. console logging
C. buffered logging
D. terminal logging

8.單項選擇題In MPLS networks, what s the benefit of disabling TTL propagation?()

A. To provide a visible extension of MPLS TTL functionality in a non MPLS-enabled domain
B. To improve the IGP convergence time
C. To hide visibility to the core (provider) routers in the MPLS network
D. To provide a visible extension of IP TTL functionality in an MPLS-enabled domain

9.多項選擇題Which of the following statements about authentication responses and conditions is true? ()(Choosetwo.)

A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.

10.單項選擇題Which information is contained in a AAA authentication method list?()

A. A pointer to the address where a RADIUS server can be located
B. A sequential list of user authentication methods
C. A description of what a user can execute on a router
D. The setup for the authentication phase on a router

最新試題

In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()

題型:單項選擇題

As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()

題型:單項選擇題

With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()

題型:單項選擇題

You have just reinstalled a VIP 6-80 in a Cisco 7500 Series router. What must you do to bring up the port adapter interfaces?()

題型:單項選擇題

Which three of these items are IPv6 transition mechanisms? ()(Choose three.)

題型:多項選擇題

Which command is used to view IPv6 parameters related to the BGP process?()

題型:單項選擇題

Refer to the exhibit. Analyze the two traceroutes that are displayed. Which of these statements is correct in describing what most likely caused the traceroute differences?()

題型:單項選擇題

In a RSTP implementation, which of the following two link types are used? ()(Choose two.)

題型:多項選擇題

You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)

題型:多項選擇題

What is the function of the no switchport catalyst switch interface configuration command?()

題型:單項選擇題