As an experienced network administrator, you are aware of the knowledge that it is unnecessary to configure complex overlay network topologies while applying Cisco Wide Area Application Services (WAAS) technology.
What is most probably the reason for that?()
A. Content pre-positioning
B. Automatic discovery of Cisco WAEs
C. Comprehensive logs, reports, and graphs
D. Remote scheduling of software distribution
您可能感興趣的試卷
你可能感興趣的試題
Cisco IOS is the software used on the vast majority of Cisco Systems routers and current Cisco network switches. As a network administrator, you are required to configure MPLS on Cisco IOS. In such a situation,
which three of the following steps are necessary to take?()
A. Start LDP.
B. Enable CEF switching.
C. Configure conditional label advertising.
D. Enable label switching on frame mode interfaces.
E. disable IP TTL propagation
F. configure conditional label advertising
A.Warnings(severity=4)
B.Errors(severity=3)
C.notifications(severity=5)
D.informational(severity=6)
As an experienced technician, you are responsible for Technical Support in your company. One of the trainees is asking you in what might happen if he issues the logging trap information command.
Which of the following statement will answer his quest|on?()
A. Informational and debug messages are logged to the syslog server.
B. All messages are sent to the logging host, where selections are made.
C. An information trap is sent to the SNMP server.
D. All messages from emergencies to informational are sent to the logging host.
A. Verify that SNMP MIB is supported in the relevant core device.
B. Implement monitoring using SNMP or RMON.
C. Implement threshold monitoring using RMON.
D. Poll and record specific SNMP MIB objects from the device.
A. Implement threshold monitoring using RMON.
B. Poll and record specific SNMP MIB objects from the device
C. Verify that the SNMP MIB is supported in the relevant core device.
D. Implement monitoring using SNMP or RMON.
A. logging on
B. logging host 10.1.5.5
C. logging console notifications
D. logging trap notifications
A. syslog logging
B. console logging
C. buffered logging
D. terminal logging
A. To provide a visible extension of MPLS TTL functionality in a non MPLS-enabled domain
B. To improve the IGP convergence time
C. To hide visibility to the core (provider) routers in the MPLS network
D. To provide a visible extension of IP TTL functionality in an MPLS-enabled domain
A. When a router receives a failure response, it stops querying authentication methods.
B. When a router receives an error response, it stops querying authentication methods.
C. If the router receives a failure response from an authentication method, it queries the next method.
D. The router does not differentiate between failure and error responses; the authentication process is always interrupted.
E. If it receives no response from the authentication method, a router will determine the error condition On its own; the router also has the option to proceed to the next method in a list if configured accordingly.
A. A pointer to the address where a RADIUS server can be located
B. A sequential list of user authentication methods
C. A description of what a user can execute on a router
D. The setup for the authentication phase on a router
最新試題
In a high-availability network, which command, when placed on ports that have connected end stations, will allow you to prevent delays in service for end stations by placing a port in blocking mode?()
As a network administrator, you issue the interface auto qos voip cisco-phone command on a port in an edge network. It is possible for a Cisco Catalyst switch to check if a Cisco IP Phone is directly attached to that port by:()
With a VPN Accelerator Module 2+ (VAM2+) installed in a Cisco 7200 series router, what will be the resulting action when entering the command no crypto engine accelerator slot number?()
You have just reinstalled a VIP 6-80 in a Cisco 7500 Series router. What must you do to bring up the port adapter interfaces?()
Which three of these items are IPv6 transition mechanisms? ()(Choose three.)
Which command is used to view IPv6 parameters related to the BGP process?()
Refer to the exhibit. Analyze the two traceroutes that are displayed. Which of these statements is correct in describing what most likely caused the traceroute differences?()
In a RSTP implementation, which of the following two link types are used? ()(Choose two.)
You are an experienced network administrator in an international corporation. One of your clients asks you to configure a network for a financial trading center which requires multiple high-value transactions.And the transactions are very important to the client. In such a situation, which two of the following are basic and most important requirements concerning the configuration? ()(Choose two.)
What is the function of the no switchport catalyst switch interface configuration command?()