题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-11-14 05:03:01

[单项选择] As a Network Engineer in an iternationai corporation, you are familliar with the Cisco products, services and solutions. Which of the following statement describes one of the charactersties of the Cisco validated Design (CVD) architectural selling approach?()
A. This approach does rot support verticalization although It is aligned to partner programs.
B. This approach integrates solutions by combining technologies that are aligned to customer buying patterns.
C. This approach is not aligned to partner programs although it supports verticalization.
D. This approach separates technologies on the basiss of customer buying patterns.

更多"As a Network Engineer in an iternat"的相关试题:

[单项选择] As an experienced Network Engineer, you are required to implement the security architecture assessment. Which of the following statement describes the most important reason for that?()
A. Create a design specification document.
B. Integrate routing and switching components.
C. Document power and UPS availability
D. Document the customer's current and future technology projects.
[单项选择]As an experienced Network Engineer, you are responsible for network connectivity and system configuration. Which of the following protocols will be supported by Cisco Nonstop Forwarding (NSF)?()
A. ISSU,OSPF,IS-IS
B. IETF,OSPF,ISSU
C. IS-IS,EIGRP,SSO,BGP
D. EIGRP,BGP,OSPF,IS-IS
[单项选择] As an experienced network engineer, you are asked to troubleshoot a CIS network outage. During the troubleshooting process, you notice that one of your colleagues connects additional devices to the network with the use of his own switch. With the purpose of improving speed, the switch is attached to both network ports in an office, which leads to bridge loop. Enabling which of the following feature will be able to prevent this problem from happening again?()
A. GLBP
B. RSTP
C. BPDU guard
D. root guard
[单项选择]A network engineer wants to allow a temporary entry for a remote user with a specific usename and password so that the user can access the entire network over the internet.which ACL can be used?()
A. reflexive
B. extended
C. standard
D. dynamic
[多项选择]As a Network Engineer, you decide to apply Cisco enterprise solution throughout the CIS network. What are the two advantages? ()(Choose two.)
A. cost savings
B. product variety
C. well-tested interoperability
D. regular upgrade process
[多项选择]As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design (CVD) program. Which three of the following descriptions are appropriate about the CVD program?() (Choose three.)
A. It incorporates a narrow range of technologies and products.
B. It facilitates faster and more reliable customer deployments.
C. It extends the value of designs through a sustained development plan.
D. It incorporates products and technologies into enterprise, service provider, and commercial systems.
[多项选择] As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()
A. reduced backup
B. increased security
C. greater storage demand
D. improved availability
[单项选择]You work as a network engineer at TestKing.com. TestKing users have noticed extremely slow network performance, intermittent connectivity, and connection loss. After entering the show interfaces command, you notice that the Ethernet interface is configured as 100 Mbps full-duplex and that there is evidence of late collisions. What could be the cause of this problem?()
A. duplex mismatch
B. a routing loop
C. trunking mode mismatch
D. improperly configured root bridge
E. improperly configured static VLAN
[单项选择]As a Network Engineer in a large-sized company, you have to master the knowledge of the Cisco mobility solution. Which of the following statement most appropriately identifies the characteristics of it?()
A. It provides high-level integrated security from the wireless access point to the client and automatically encrypts voice and data in transit.
B. It allows you to centralize management, automate repetitive tasks, and provision IP services easily.
C. It centralizes your infrastructure and allows you to share resources more effectively by combining separate data centers into an interconnected SAN.
D. It authenticates users and devices so that it is impossible for a rogue device to be connected to the network.
[多项选择]As a network engineer, you responsibility is to install, configure, operate, and troubleshoot networks. In your company’s network, EIGRP is the routing protocol. You have just discovered that two routers restarted the neighbor relationship.Why? ()
A. An update packet with init flag set from a known, already established neighbor relationship was received by one of the routers.
B. The counters were deleted.
C. The ARP cache was removed.
D. The IP EIGRP neighbor relationship was cleared manually.
[单项选择]A Network Engineer is reporting that one of the AIX hosts is generating too much ICMP traffic, which is slowing the network.  Which of the following options is the most probable cause?()
A. A large FTP job is in process. 
B. A network interface was misconfigured. 
C. The ping command is being used excessively. 
D. A bad network interface card and/or network cable is in use. 
[单项选择]A network engineer wants to allow a temporary entry for a remote user with a specific usename andpassword so that the user can access the entire network over the internet.which ACL can be used?()
A. reflexive
B. extended
C. standard
D. dynamic
[单项选择]As a network engineer, do you know for what purpose SDM uses Security Device Event Exchange(SDEE)?()
A. to provide a keepalive mechanism
B. to pull event logs from the router
C. to extract relevant SNMP information
D. to perform application-level accounting
[单项选择]As a network engineer at Certpaper.com, you are responsible for Certpaper network. Which will benecessarily taken into consideration when implementing Syslogging in your network?()
A. Enable the highest level of Syslogging available to ensure you log all possible event messages
B. Use SSH to access your Syslog information
C. Log all messages to the system buffer so that they can be displayed when accessing the router
D. Syncronize clocks on the network with a protocol such as Network Time Protocol

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码