to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
to two core switches from redundant distribution switches connected with a Layer 2 link
to two core switches from redundant distribution switches connected with a Layer 3 link
to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
第1题:
A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with a Layer 2 link
D. to two core switches from redundant distribution switches connected with a Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
第2题:
To which switch or switches should you provide redundant links in order to achieve high availability with reliable fast convergence in the enterprise campus?()
第3题:
You are troubleshooting an issue which is causing full-sized packets entering the MPLS cloud be dropped. You have discovered that one of the switches in the MPLS core is not a Cisco switch, but otherwise the MPLS MTU size is set to 1508 bytes on the routers. Based on this information, which of these may be the reason the packets are being dropped?()
第4题:
Which of the following devices is used to provide appropriate voltage to the CPU?()
第5题:
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。
第6题:
You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()
第7题:
A new switch is being installed and you have been assigned the task of connecting it to an existing switch. In doing this, you want to set up the VLAN Trunking Protocol so that VLAN information can be passed between the switches. Which of the following must you do to accomplish this?()
第8题:
A network administrator needs to add an additional connection to a room. The administrator adds a new Ethernet switch and must connect it to an existing switch. Which cable type should be used to connect the two switches?()
第9题:
A customer wants to install an IBM BladeCenter infrastructure but is concerned about the cost of the full fabric internal fibre switches. Consequently, the customer is considering an N_Port ID Virtualization (NPIV) capable switch.Which of the following should be mentioned to the customer regarding the NPIV switch?()
第10题:
The switch on you MPLS core that was not produced by Cisco does not support oversized packets
No switches support oversized packets
By definition, the maximum MTU is 1500 bytes
As MPLS VPN labeling increases the size of the packet by 8 bytes, the IP MTU should have been changed to 1508
第11题:
Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
Routing should always be performed at the distribution layer.
VLANs should be localized to a switch.
VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
Routing should not be performed between VLANs located on separate switches.
第12题:
to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
to two core switches from redundant distribution switches connected with Layer 2 link
to two core switches from redundant distribution switches connected with Layer 3 link
to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
第13题:
A port in a redundant topology is currently in the blocking state and is not receiving BPDUs. To ensure that this port does not erroneously transition to the forwarding state, which command should be configured to satisfy the requirement?()
第14题:
You need to set the default gateway of one of your TestKing switches. Which command will set the default gateway to 192.168.12.1 on a Cisco switch?()
第15题:
You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()
第16题:
Which of the following should you enable to prevent a switch from forwarding packets with source addresses that are outside an administratively defined group? ()
第17题:
You are charged with implementing a secure wireless installation which will provide Internet access to client devices but will not allow communications between wireless clients. In addition toimplementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actionsshould you perform on the wired infrastructure?()
第18题:
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
第19题:
four switches, which one will be root switch.(no pic).
第20题:
When planning for redundant power sources in a server deployment, which of the following should be purchased?()
第21题:
You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a n On-Line Analytical Processing (OLAP) database named in the instance. The database contains a dimension table named Clients. Ever hour backup of data of the Clients table is performed. But the Clinets table contains redundant data. You must keep the disk space used to store the Clients table. In the options below, which compression technology should you use?()
第22题:
You must set each end of the trunk line to IEEE 802.1e encapsulation.
You must set the same VTP management domain name on both switches.
You must set all ports on the two switches as access ports.
You must configure one of the switches as a VTP server.
You must use a rollover cable to connect the two switches.
第23题:
Verify that different native VLANs exist between two switches for security purposes.
Verify that the VLAN was added on all switches with the use of the show vlan command.
Verify that the switch is configured to allow for trunking on the switch ports.
Verify that each switch port has the correct IP address space assigned to it for the new VLAN.
第24题: