A.iSCSI
B.FCIP
C.SCSI-FP
D.eSCSI
第1题:
If voice and data traffic will be sent and received via a WAN links, what must be configured to provide a certain amount of dedicated bandwidth and to prioritize the voice traffic over other types of network traffic?()
第2题:
What is the goal of the borderless network architecture?()
第3题:
Which of the following would an administrator use to configure a server’s BIOS settings even if the OS crashes?()
第4题:
Which of the following can transmit block level storage over Ethernet?()
第5题:
A customer wants to create backups at a remotely located datacenter. Price and performance are of primary importance, so backup to disks at the remote location is selected instead of tape. The remote location is 1 KM (0.6 Miles) away from the data center. NAS is the solution being considered. Which of the following is the benefit of this solution?()
第6题:
Your company has an Active Directory Domain Services (AD DS) domain. You install the Remote Desktop Session Host (RD Session Host) role service and the Microsoft Application Virtualization (App - V) 4.6 client on a server that runs Windows Server 200 8 R2. You publish applications to the RD Session Host server by using App - V. Partner companies require access to an internal application. You provide each partner company with a preconfigured Remote Desktop Protocol (.rdp) file that enables the company to access the application by using the Connect From Anywhere feature. You need to specify the protocol that each partner company must allow through its firewall to establish the connection. Which protocol should you specify?()
第7题:
You are designing a Windows Azure application that will provide online backup storage for very large media files. The application must be capable of storing an average of 1 GB of data for each user. The application must provide random read/write access. You need to recommend a durable data storage solution. What should you recommend?()
第8题:
USB 2.0
eSATA
CAT5
FireWire
第9题:
MS-CHAP v2.
Internet Authentication service (IAS).
Multilink & Bandwidth Allocation Protocol (BAP).
Remote access policies on all servers running Routing & Remote Access.
第10题:
The FCIP stack supports file-level storage for remote devices.
Both require high throughput with low latency and low jitter.
The purpose of FCIP is to provide connectivity between host and storage.
The iSCSI stack supports block-level storage for remote devices.
The purpose of iSCSI is to provide connectivity between separate wide-area SANs.
第11题:
when the remote VPN peer is behind a NAT device
when multiple networks need to be reached across the tunnel
when the remote VPN peer is a dialup or remote access client
when a dynamic routing protocol such as OSPF is required across the VPN
第12题:
MS-CHAP v2.
Internet Authentication service (IAS).
Multilink & Bandwidth Allocation Protocol (BAP).
Remote access policies on all servers running Routing & Remote Access.
第13题:
What is the goal of the borderless network architecture?()
第14题:
Which protocol would provide block access to remote storage over WAN links?()
第15题:
Which of the following protocols define the rules and processes used to transmit and receive block storage applications over TCP/IP?()
第16题:
Which of the following protocols would BEST grant the user secure access to a remote location?()
第17题:
You are a network administrator for your company. The network consists of a single Active Directory domain. All servers run Windows Server 2003. The company’s main office is in Barcelona, and it has branch offices in Paris and London. The company has no immediate plans to expand or relocate the offices. The company wants to connect the office networks by using a frame relay WAN connection and Routing and Remote Access servers that are configured with frame relay WAN adapters. Computers in each office will be configured to use the local Routing and Remote Access server as a default gateway. You are planning the routing configuration for the Routing and Remote Access servers. You need to allow computers in Barcelona, Paris, and London to connect to computers in any office. You want to minimize routing traffic on the WAN connection. What should you do? ()
第18题:
You are designing a remote access strategy to meet the business & technical requirements. Which authentication mechanism should you use?()
第19题:
At each office, add the OSPF routing protocol to Routing and Remote Access, add the WAN adapter to the OSPF routing protocol, and deploy OSPF as a single-area internetwork.
At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 broadcast and the incoming packet protocol as RIP version 1 and 2.
At each office, add the RIP version 2 routing protocol to Routing and Remote Access, and configure the WAN adapter to use RIP version 2. Configure the outgoing packet protocol as RIP version 2 multicast and the incoming packet protocol as RIP version 2 only.
At each office, configure the Routing and Remote Access server with static routes to the local networks at the other two offices.
第20题:
IPSec VPN
QoS mechanism
Firewall
NAT
EIGRP routing protocol
Static routing
第21题:
IBM XIV Storage System
IBM System Storage DS8700
IBM System Storage N6070
IBM System Storage N6210
第22题:
iSCSI
FCIP
SCSI-FP
eSCSI
第23题:
External RAID array on an existing server
Network Attached Storage
Storage Area Network
Tape library
第24题:
to provide users with A single device that permits access to information anywhere
to provide users with the same productivity and access to information no matter where are or which device they use
to eliminate the need for border security and firewalls
to provide companies with A way to extend their security and control over employees on the internet