更多“多选题What are four benefits of recommended basic architecture?()AGood load balancing between Presentation Tier and Object TierBEasy administrationCFlexible Load balancingDOptimal performanceESimple security”相关问题
  • 第1题:

    It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()

    • A、 single layer of firewalling
    • B、 multiple layers of firewalling
    • C、 firewall connections in either an active or standby state
    • D、 an architecture in which all traffic between firewalls goes through application-specific servers

    正确答案:B

  • 第2题:

    What are three Juniper DX Cluster benefits?() (Choose three.)

    • A、performance
    • B、authorization
    • C、compression
    • D、protocol validation
    • E、UDP load balancing

    正确答案:A,C,D

  • 第3题:

    What are three benefits of GLBP?()

    • A、GLBP supports up to eight virtual forwarders per GLBP group
    • B、GLBP supports clear text and MD5 password authentication between GLBP group members
    • C、GLBP is an open source standardized protocol that can be used with multiple vendors
    • D、GLBP supports up to 1024 virtual routers
    • E、GLBP can load share traffic across a maximum of four routers
    • F、GLBP elects two AVGs and two standby AVGs for redundancy

    正确答案:B,E

  • 第4题:

    What are two functions that the parameter max-session performs? ()(Choose two.)

    • A、Defines the session limit for the domain.
    • B、Defines the session limit for the tunnel instance.
    • C、Used to control load balancing between multiple domains.
    • D、Used to control load balancing between multiple tunnels for a domain.

    正确答案:B,D

  • 第5题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()

    • A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
    • B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
    • C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
    • D、 Add the port rule through Network Connections Properties on each node.

    正确答案:D

  • 第6题:

    多选题
    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
    A

    Log on to one of the cluster nodes and run the wlbs disable all command.

    B

    Open the Network Load Balancing Clusters console and delete the default port rules.

    C

    Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.

    D

    Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.


    正确答案: C,A
    解析: 暂无解析

  • 第7题:

    多选题
    What are three Juniper DX Cluster benefits?() (Choose three.)
    A

    performance

    B

    authorization

    C

    compression

    D

    protocol validation

    E

    UDP load balancing


    正确答案: C,A
    解析: 暂无解析

  • 第8题:

    多选题
    What are four benefits of recommended basic architecture?()
    A

    Good load balancing between Presentation Tier and Object Tier

    B

    Easy administration

    C

    Flexible Load balancing

    D

    Optimal performance

    E

    Simple security


    正确答案: B,A
    解析: 暂无解析

  • 第9题:

    多选题
    What are three benefits of GLBP?()
    A

    GLBP supports up to eight virtual forwarders per GLBP group

    B

    GLBP supports clear text and MD5 password authentication between GLBP group members

    C

    GLBP is an open source standardized protocol that can be used with multiple vendors

    D

    GLBP supports up to 1024 virtual routers

    E

    GLBP can load share traffic across a maximum of four routers

    F

    GLBP elects two AVGs and two standby AVGs for redundancy


    正确答案: C,E
    解析: 暂无解析

  • 第10题:

    多选题
    When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones. Whichtwo general control settings should you select?()
    A

    Multicast on

    B

    Aggressive Load Balancing off

    C

    Multicast off

    D

    AP Fallback on

    E

    Aggressive Load Balancing on


    正确答案: C,E
    解析: 暂无解析

  • 第11题:

    多选题
    An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()
    A

    change the EtherChannel default hashing algorithm from XOR to use source port Layer 4 port load balancing to better load balance the traffic

    B

    change the EtherChannel default hashing algorithm from XOR to use destination Layer 4 port load balancing to better load balance the traffic

    C

    have the application recoded to use multiple connections instead of a single connection so EtherChannel can better load balance the traffic

    D

    upgrade the CPU and memory of the compute devices so they can better process traffic

    E

    upgrade the EtherChannel bundle to a single gigabit link because EtherChannel is not well suited for single-connection traffic


    正确答案: E,D
    解析: 暂无解析

  • 第12题:

    单选题
    What is Phantom RP used for?()
    A

    it is used for load balancing in bidirectional PIM

    B

    it is used for redundancy in bidirectional PIM

    C

    it is used for redundancy in PIM-SM

    D

    it is used for load balancing in PIM-SM


    正确答案: A
    解析: 暂无解析

  • 第13题:

    The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch,there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing? ()

    • A、source IP address
    • B、destination IP address
    • C、per-packet load balance
    • D、destination MAC address
    • E、source MAC address

    正确答案:A,B,D,E

  • 第14题:

    What is the meaning of the default value of the EIGRP variance command of 1? ()

    • A、Only the path that is the feasible successor should be used.
    • B、Load balancing is disabled on t his router.
    • C、The router only performs equal - cost load balancing on all paths that have a metric greater than 1
    • D、The router performs equal - cost load balancing.

    正确答案:D

  • 第15题:

    Prioritizing traffic between data and voice is defined as which of the following?()

    • A、Caching engines
    • B、Proxy server
    • C、QoS
    • D、Load balancing

    正确答案:C

  • 第16题:

    What are three benefits of using ASM?() 

    • A、 Ease of disk administration and maintenance
    • B、 Load balancing across physical disks
    • C、 Software RAID-1 data redundancy with double or triple mirrors
    • D、 Automatic recovery of failed disks

    正确答案:A,B,C

  • 第17题:

    You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()

    • A、Configure the front-end servers in each branch office to be members of a new Active Directory site
    • B、Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)
    • C、Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connections
    • D、Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

    正确答案:D

  • 第18题:

    单选题
    It’s a configuration that experts are calling a "firewall sandwich," with the second firewall providinga second level of load balancing after traffic down. What is meant by the term "firewall sandwich"?()
    A

     single layer of firewalling

    B

     multiple layers of firewalling

    C

     firewall connections in either an active or standby state

    D

     an architecture in which all traffic between firewalls goes through application-specific servers


    正确答案: A
    解析: 暂无解析

  • 第19题:

    多选题
    What are two valid Cluster load balancing methods? ()(Choose two.)
    A

    urlhash

    B

    backup chaining

    C

    least connections

    D

    fewest outstanding requests


    正确答案: A,D
    解析: 暂无解析

  • 第20题:

    多选题
    What are two characteristics of Server Load Balancing router mode?()
    A

    The design supports multiple server subnets Cisco 642-874: Practice Exam

    B

    An end-user sees the IP address of the real server

    C

    SLB routes between the outside and inside subnets

    D

    The source or destination MAC address is rewritten, but the IP addresses left alone

    E

    SLB acts as a bump in the wire between servers and upstream firewall or Layer 3 devices


    正确答案: D,B
    解析: 暂无解析

  • 第21题:

    单选题
    What is the meaning of the default value of the EIGRP variance command of 1? ()
    A

    Only the path that is the feasible successor should be used.

    B

    Load balancing is disabled on t his router.

    C

    The router only performs equal - cost load balancing on all paths that have a metric greater than 1

    D

    The router performs equal - cost load balancing.


    正确答案: A
    解析: 暂无解析

  • 第22题:

    多选题
    What are two functions that the parameter max-session performs? ()(Choose two.)
    A

    Defines the session limit for the domain.

    B

    Defines the session limit for the tunnel instance.

    C

    Used to control load balancing between multiple domains.

    D

    Used to control load balancing between multiple tunnels for a domain.


    正确答案: C,A
    解析: 暂无解析

  • 第23题:

    多选题
    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
    A

    Log on to one of the cluster nodes and run the wlbs disable all command.

    B

    Open the Network Load Balancing Clusters console and delete the default port rules.

    C

    Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.

    D

    Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.


    正确答案: A,D
    解析: 暂无解析

  • 第24题:

    多选题
    The EtherChannel between your LAN switch and the Internet router is not load-balancing efficiently. On the switch, there are several workstations with valid IP ranges. Which load-balance algorithms can you use in the switch in order to optimize this load balancing?()
    A

    source IP address

    B

    destination IP address

    C

    per-packet load balance

    D

    destination MAC address

    E

    source MAC address


    正确答案: E,B
    解析: 暂无解析