RFP
RFC
SLC/SLA
SOW
第1题:
Wh.ch version of spanning tree is recommended for the enterprise campus?()
第2题:
If the default VDC is configured to limit resources to a specific module type, what happens when a module that does not match the resource type is installed?()
第3题:
When designing remote access to the Enterprise Campus network for teleworkers and mobileworkers, which of the following should the designer consider?()
第4题:
Where does Layer2 de-encapsulation occur on the ERX Edge Router?()
第5题:
A banking customer deployed an IBM BladeCenter chassis with one Brocade 8Gb SAN switch module. The customer requires an 8Gb uplink or higher. Which configuration will meet this request?()
第6题:
A customer has two Ethernet Switch Modules installed in an IBM BladeCenter Enterprise chassis. The modules were configured identically. The Ethernet module in bay one was inadvertenly reset to factory defaults. Which solution returns the module to the customer-specific configuration?()
第7题:
Reports
Compliance
Support Workbench
Asset Discovery
visual creation of JDBC DataSource object to Oracle RAC
第8题:
Routed mode requires the ACE run OSPF or EIGRP
Bridged mode switches a packet between the public and the private subnets when it sees itsMAC address as the destination
Two-armed mode will place the SLB inline to the servers, with different client-side and a server-side VLANs
One-armed mode, which uses the same VLAN for the client, the ACE, and the servers, requiresa traffic-diversion mechanism to ensure the traffic return from the server passes though the ACE
第9题:
determine types of protocols to be supported
determine the environment in which the router will be used
select the number of WAN ports required
select the number of LAN ports required
第10题:
The module is powered up, and interfaces are in an admin down state.
The module is denied power, and a syslog message is generated.
The module is powered up, and interfaces are allocated to VDC0.
The module is powered up, and interfaces are allocated to VDC100.
第11题:
FHRP to remote branches.
Layer 3 MPLS VPNs routing.
Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
Intrusion prevention, QoS, and stateful firewall support network wide.
第12题:
iBGB dual horning with different iSPs puts the Enterprise at the risk of becoming a transitnetwork
iBGP requires a full mesh of eBGP peers
Routers will not advertise iBGP learned routers to other iBGP peers.
The use of route reflections or Confederation eliminate any full mesh requirement while helpingto scale iBGP
iGBP peers do not add any information to the AS path
第13题:
Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()
第14题:
When designing the routing for an Enterprise Campus network it is important to keep while of thefollowing filtering aspects in mind?()
第15题:
Which of the following is true when considering the Server load-balancing design within the E-Commerce Module of the Enterprise Campus network?()
第16题:
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()
第17题:
When designing an expansion within the same data center, when is a pre-sales TDA absolutely required by IBM?()
第18题:
When a critical error occurs, which module in Enterprise Manager will automatically collect diagnostics data from WebLogic Server?()
第19题:
for a SAN768B Director
for a second TS3500 Tape Library
for a second EXP5060 Expansion Unit
for an additional DS8300 Expansion Frame
第20题:
determine types of protocols to be supported
determine the environment in which the router will be used
select the number of WAN ports required
select the number of LAN ports required
第21题:
It is recommended to place the VPN termination device in line with the Enterprise Edge 1
Maintaining access rules, based on the source IP of the client, on an internal firewall drawnfrom a headend RADIUS server is the most secure deployment
VPN Headend routing using Reverse Route Injection (RRI) with distribution is recommended when the remote user community is small and dedicated DHCP scopes are in place
Clientless SSL VPNs provide more granular access control than SSL VPN clients (thin or thick),including at Layer 7
第22题:
CST
MST
STP
PVST+
PVRST+
第23题:
Filtering is only useful when combined with route summarization
It is best to filter (allow) the default and summary prefixes only in the Enterprise Edge to remotesites or site-to-site IPsec VPN networks
IGPs (for example EIGRP or OSPF) are superior to route filtering in avoiding in inappropriatetransit traffic through remote nodes or inaccurate or inappropriate routing updates
The primary limitation of router filtering is that it can only be applied on outbound updates