Good load balancing between Presentation Tier and Object Tier
Easy administration
Flexible Load balancing
Optimal performance
Simple security
第1题:
It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()
第2题:
What are three Juniper DX Cluster benefits?() (Choose three.)
第3题:
What are three benefits of GLBP?()
第4题:
What are two functions that the parameter max-session performs? ()(Choose two.)
第5题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()
第6题:
Log on to one of the cluster nodes and run the wlbs disable all command.
Open the Network Load Balancing Clusters console and delete the default port rules.
Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
第7题:
performance
authorization
compression
protocol validation
UDP load balancing
第8题:
Good load balancing between Presentation Tier and Object Tier
Easy administration
Flexible Load balancing
Optimal performance
Simple security
第9题:
GLBP supports up to eight virtual forwarders per GLBP group
GLBP supports clear text and MD5 password authentication between GLBP group members
GLBP is an open source standardized protocol that can be used with multiple vendors
GLBP supports up to 1024 virtual routers
GLBP can load share traffic across a maximum of four routers
GLBP elects two AVGs and two standby AVGs for redundancy
第10题:
Multicast on
Aggressive Load Balancing off
Multicast off
AP Fallback on
Aggressive Load Balancing on
第11题:
change the EtherChannel default hashing algorithm from XOR to use source port Layer 4 port load balancing to better load balance the traffic
change the EtherChannel default hashing algorithm from XOR to use destination Layer 4 port load balancing to better load balance the traffic
have the application recoded to use multiple connections instead of a single connection so EtherChannel can better load balance the traffic
upgrade the CPU and memory of the compute devices so they can better process traffic
upgrade the EtherChannel bundle to a single gigabit link because EtherChannel is not well suited for single-connection traffic
第12题:
it is used for load balancing in bidirectional PIM
it is used for redundancy in bidirectional PIM
it is used for redundancy in PIM-SM
it is used for load balancing in PIM-SM
第13题:
The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch,there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? ()
第14题:
What is the meaning of the default value of the EIGRP variance command of 1? ()
第15题:
Prioritizing traffic between data and voice is defined as which of the following?()
第16题:
What are three benefits of using ASM?()
第17题:
You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()
第18题:
single layer of firewalling
multiple layers of firewalling
firewall connections in either an active or standby state
an architecture in which all traffic between firewalls goes through application-specific servers
第19题:
urlhash
backup chaining
least connections
fewest outstanding requests
第20题:
The design supports multiple server subnets Cisco 642-874: Practice Exam
An end-user sees the IP address of the real server
SLB routes between the outside and inside subnets
The source or destination MAC address is rewritten, but the IP addresses left alone
SLB acts as a bump in the wire between servers and upstream firewall or Layer 3 devices
第21题:
Only the path that is the feasible successor should be used.
Load balancing is disabled on t his router.
The router only performs equal - cost load balancing on all paths that have a metric greater than 1
The router performs equal - cost load balancing.
第22题:
Defines the session limit for the domain.
Defines the session limit for the tunnel instance.
Used to control load balancing between multiple domains.
Used to control load balancing between multiple tunnels for a domain.
第23题:
Log on to one of the cluster nodes and run the wlbs disable all command.
Open the Network Load Balancing Clusters console and delete the default port rules.
Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
第24题:
source IP address
destination IP address
per-packet load balance
destination MAC address
source MAC address