题目详情
当前位置:首页 > 职业培训考试
题目详情:
发布时间:2023-10-23 09:31:21

[单项选择]You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()
A. OSPF
B. RIP
C. BGP
D. static

更多"You have a network containing 120 r"的相关试题:

[单项选择] You have a network containing 120 routers. You must establish and maintain connectivity between the loopback interfaces of all routers. Because of the critical services using the network, you need redundancy and fast failover. Which routing protocol should you use in this scenario?()
A. OSPF
B. RIP
C. BGP
D. static
[单项选择]You have amulti-area OSPF network and you’re concerned because one of the sites is having connectivity problem to resources in a different area. Which IOS privileged mode command would you enter to confirm that your network :A.has a path to itsABR,B.has a path to itsASBR,and C.the SPF calculation is functional()
A. show ip protocols
B. show running-config
C. show ip ospfneighbor
D. show ip ospfborder-routers
[多项选择]What are three factors a network administrator must consider before implementing Netflow in the network?()
A. CPU utilization
B. where Netflow data will be sent
C. number of devices exporting Netflow data
D. port availability
E. SNMP version
F. WAN encapsulation
[多项选择] You administer a network containing SRX Series firewalls. New policy requires that you implement MAG Series devices to provide access control for end users. The policy requires that the SRX Series devices dynamically enforce security policy based on the source IP address of the user. The policy also requires that the users communicate with protected resources using encrypted traffic. Which two statements are true?()
A. The endpoints can use agentless access.
B. Encrypted traffic flows between the endpoint and the enforcer.
C. Encrypted traffic flows between the endpoint and the protected resource
D. The endpoints can use the Odyssey Access Client.
[单项选择]To get the information from BDU every day, you must______.
A. understand Chinese
B. know something about the mouse
C. know how to operate a computer
D. know how to use a fax machine
[单项选择]You have a class C network, and you need to design it for 5 usable subnets with each subnet handling a minimum of 18 hosts each. Which of the following network masks should you use?()
A. 225.225.224.0.
B. 225.225.240.0.
C. 225.225.255.0.
D. 255.255.255.224
E. 225.225.255.240
[单项选择]You have a Class C network, and you need ten subnets. You wish to have as many addresses available for hosts as possible. Which one of the following subnet masks should you use?()
A. 255.255.255.192
B. 255.255.255.224
C. 255.255.255.240
D. 255.255.255.248
E. None of the above
[单项选择]As a network administrator, you have configured a Catalyst 6500 Series Switch with redundant supervisor engine in a CIS network. What is the result of issuing the redundancy force-switchover command on that switch?()
A. Automatic switchover from active to standby on primary supervisor failure
B. Reset of the primary supervisor.
C. Manual switchover from active to standby supervisor
D. Manual switchover from standby to active supervisor
[单项选择]As a network administrator, you have been instructed to prevent all traffic originating on the LAN from entering the R2 router. Which the following command would implement the access list on the interface of the R2 router?()
A. access-list 101 in
B. access-list 101 out
C. ip access-group 101 in
D. ip access-group 101 out
[单项选择]You have a network that supports VLSM and you need to reduce IP address waste in your point to point WAN links. Which of the masks below would you use?()
A. /38
B. /30
C. /27
D. /23
E. /18
F. /32
[单项选择]You have a firewall filter containing two terms applied in an inbound direction on a customer interface.You would like this filter to protect your network from a spoofed denial of service attack. Which match criterion should be configured ito identify unwanted packets?()
A. from source-port
B. from source-address
C. from destination-address
D. from destination-port
[简答题]翻译题:You have spent a whole evening in a French music hall with a dirty-looking fat man who, instead of having messages slipped into his hand by dark-eyed beauties, gets only an ordinary telephone call making an appointment in his room.
[多项选择]As a Cisco Network Engineer, you have to master the knowledge of the Cisco validated Design (CVD) program. Which three of the following descriptions are appropriate about the CVD program?() (Choose three.)
A. It incorporates a narrow range of technologies and products.
B. It facilitates faster and more reliable customer deployments.
C. It extends the value of designs through a sustained development plan.
D. It incorporates products and technologies into enterprise, service provider, and commercial systems.
[多项选择] As a Network Engineer, you have to master how to deploy Virtual Storage Area Network and what are the results of the deployment. Which two of the following are resulting from its deployment?()
A. reduced backup
B. increased security
C. greater storage demand
D. improved availability
[单项选择]Tom: You are playing guitar well. Can you read musicCharles: No, I don't. I just listen to songs on the radio and then play them until they sound right.Tom: ______.Charles: No, really.

我来回答:

购买搜题卡查看答案
[会员特权] 开通VIP, 查看 全部题目答案
[会员特权] 享免全部广告特权
推荐91天
¥36.8
¥80元
31天
¥20.8
¥40元
365天
¥88.8
¥188元
请选择支付方式
  • 微信支付
  • 支付宝支付
点击支付即表示同意并接受了《购买须知》
立即支付 系统将自动为您注册账号
请使用微信扫码支付

订单号:

请不要关闭本页面,支付完成后请点击【支付完成】按钮
恭喜您,购买搜题卡成功
重要提示:请拍照或截图保存账号密码!
我要搜题网官网:https://www.woyaosouti.com
我已记住账号密码