Which two design concerns must be addressed when designing a multicast implementation?()A. only the low-order 23 bits of the MAC address are used to map IP addressesB. only the low-order 24 bits of the MAC address are used to map IP addressesC. only the h

题目
Which two design concerns must be addressed when designing a multicast implementation?()

A. only the low-order 23 bits of the MAC address are used to map IP addresses

B. only the low-order 24 bits of the MAC address are used to map IP addresses

C. only the high-order 23 bits of the MAC address are used to map IP addresses

D. only the low-order 23 bits of the IP address are used to map MAC addresses

E. the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses

F. the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses


相似考题
更多“Which two design concerns must be addressed when designing a multicast implementation?() ”相关问题
  • 第1题:

    Which two statements are tru e about the rendezvous point (RP) in a multicast network?()

    • A、The multicast sources must register with the RP to form the multicast distribution tree
    • B、An RP is required only in networks running Protocol Independent Multicast dense mode ( PIM DM)
    • C、The multicast receivers must register with the RP to form the multicast distribution tree
    • D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM)
    • E、An RP is required only in networks running Pro tocol Independent Multicast sparse - dense mode (PIM - SDM)
    • F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP

    正确答案:D,F

  • 第2题:

    When configuring a wlan controller for a voice application using cisco 7920 wireless ip phones. which two general control settings should you select?()

    • A、multicast on
    • B、aggressive load balancing off
    • C、multicast off
    • D、ap fallback on
    • E、aggressive load balancing on
    • F、ap fallback off

    正确答案:B,C

  • 第3题:

    When configuring a WLAN controller for a voice application using Cisco 7920 wireless IP phones,which two general control settings should you select?()

    • A、Aggressive Load Balancing on
    • B、Aggressive Load Balancing off
    • C、Multicast on
    • D、Multicast off
    • E、AP Fallback on
    • F、AP Fallback off

    正确答案:B,D

  • 第4题:

    Which three of the following are organizational objectives that should be addressed when developing a new VLAN implementation plan? ()

    • A、network management
    • B、improving QoS
    • C、determining budget
    • D、reducing costs
    • E、increasing competitiveness
    • F、improving customer support

    正确答案:D,E,F

  • 第5题:

    Which two statements are true about the rendezvo us point (RP) in a multicast network?()

    • A、The multicast sources must register with the RP to form the multicast distribution tree.
    • B、An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).
    • C、The mu lticast receivers must register with the RP to form the multicast distribution tree.
    • D、An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).
    • E、An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).
    • F、To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.

    正确答案:D,F

  • 第6题:

    You deployed a Java EE Shared Library and want to use it from an application that is also deployed on the same cluster.    Which two manifest attributes must be specified at a minimum with corresponding values in the deployment descriptor of the application that requires?()

    • A、Implementation-Version
    • B、Specification-Version
    • C、Extension-Name  
    • D、Specification-Vendor
    • E、Implementation-Vendor

    正确答案:A,C

  • 第7题:

    You are designing a DNS implementation strategy for the network.  Which two zone types should you use?()

    • A、Reverse lookup zones
    • B、Standard primary zones
    • C、Standard secondary zones
    • D、Active Directory-integrated zones

    正确答案:A,D

  • 第8题:

    多选题
    Which two design concerns must be addressed when designing a multicast implementation?()
    A

    only the low-order 23 bits of the MAC address are used to map IP addresses

    B

    only the low-order 24 bits of the MAC address are used to map IP addresses

    C

    only the high-order 23 bits of the MAC address are used to map IP addresses

    D

    only the low-order 23 bits of the IP address are used to map MAC addresses

    E

    the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses

    F

    the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresses


    正确答案: A,D
    解析: 暂无解析

  • 第9题:

    多选题
    Which three of the following are organizational objectives that should be addressed when developing a new VLAN implementation plan? ()
    A

    network management

    B

    improving QoS

    C

    determining budget

    D

    reducing costs

    E

    increasing competitiveness

    F

    improving customer support


    正确答案: A,D
    解析: 暂无解析

  • 第10题:

    多选题
    You are evaluating the implementation of two Hyper-V hosts for the application servers. You need to design a solution that will move the application servers automatically between the Hyper-V hosts based on the physical resources available. The solution must minimize the number of Microsoft System Center products deployed to the network. Which software should you include in the design?()
    A

    Microsoft System Center Operations Manager

    B

    Microsoft System Center Virtual Machine Manager

    C

    Microsoft System Center Data Protection Manager

    D

    Microsoft System Center Configuration Manager


    正确答案: D,C
    解析: 暂无解析

  • 第11题:

    多选题
    Which two statements are true about the rendezvo us point (RP) in a multicast network?()
    A

    The multicast sources must register with the RP to form the multicast distribution tree.

    B

    An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).

    C

    The mu lticast receivers must register with the RP to form the multicast distribution tree.

    D

    An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).

    E

    An RP is required only in networks running Protocol Independent Mu lticast sparse - dense mode (PIM - SDM).

    F

    To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.


    正确答案: D,A
    解析: 暂无解析

  • 第12题:

    多选题
    When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()
    A

    a list of existing network applications currently in use on the network

    B

    network audit results to uncover any potential security holes

    C

    a planned Layer 2 design solution

    D

    a proof-of-concept plan

    E

    device configuration templates


    正确答案: C,A
    解析: 暂无解析

  • 第13题:

    Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()

    • A、 OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
    • B、 IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
    • C、 QoS requirements with MPLS-VPN must be implemented by the service provider
    • D、 Hierarchical VPLS designs are the least scalable
    • E、 IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required

    正确答案:A,C

  • 第14题:

    In order to configure two routers as anycast RPs, which of these requirements, af a minimum, must besatisfied?()

    • A、Multicast Source Discovery Protocol mesh-groups must be configured between the two anycast RPs.
    • B、The RPs must be within the same IGP domain.
    • C、Multicast Source Discovery Protocol must be configured between the two anycast RPs.
    • D、The two anycast RPs must be IBGP peers.

    正确答案:C

  • 第15题:

    In order to configure two routers as anycast RPs,which of these requirements,at a minimum, must be satisfied?()

    • A、Multicast Source Discovery Protocol mesh-groups must be configured between the two anycast RPs.
    • B、The RPs must be within the same IGP domain.
    • C、Multicast Source Discovery Protocol must be configured between the two anycast RPs.
    • D、The two anycast RPs must be IBGP peers.

    正确答案:C

  • 第16题:

    Which two of these are characteristics of multicast routing? ()

    • A、 multicast routing uses RPF
    • B、 multicast routing is connectionless.
    • C、 In multicast routing, the source of a packet is known.
    • D、 When network topologies change, multicast distribution trees are not rebuilt, but use the originalpath
    • E、 Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destination

    正确答案:A,C

  • 第17题:

    Which two are needed components when designing and implementing a security solution?()

    • A、detailed VLAN information
    • B、an incident response plan
    • C、results of testing the new network configuration
    • D、an existing hierarchical network topology
    • E、a security policy for your organization

    正确答案:B,E

  • 第18题:

    Which two requirements would lead towards a high availability solution?()

    • A、When uptime is critical
    • B、When data must be refactored
    • C、When application concurrency is static
    • D、When data loss is unacceptable
    • E、When application is a single point of failure

    正确答案:A,D

  • 第19题:

    单选题
    You need to design a method to encrypt confidential data. Your solution must address the concerns of the chief information officer. What should you do?()
    A

    Encrypt customer information when it is stored and when it is being transmitted

    B

    Require encrypted connections to the public Web site, which is hosted on the Web server on the perimeter network

    C

    Encrypt all marketing information on file servers and client computers

    D

    Require encrypted connections to all file servers


    正确答案: D
    解析: 暂无解析

  • 第20题:

    多选题
    Which two statements are true about the rendezvous poin t (RP) in a multicast network?()
    A

    The multicast sources must register with the RP to form the multicast distribution tree.

    B

    An RP is required only in networks running Protocol Independent Multicast dense mode (PIM DM).

    C

    The multicast receivers must register with the RP to form the multicast distribution tree.

    D

    An RP is required only in networks running Protocol Independent Multicast sparse mode (PIM SM).

    E

    An RP is required only in networks running Protocol Independent Multicast sparse - dense mode (PIM - SDM).

    F

    To form the multicast distribution tree, the multicast sources register with and the receivers join the RP.


    正确答案: C,A
    解析: 暂无解析

  • 第21题:

    多选题
    When delivering the results of a Solutions Recommendation, which two of the following components should be included in the solutions presentation?()
    A

    additional partner services

    B

    the Value Assessment

    C

    the Discovery Guide

    D

    the benefits of your solution

    E

    employee concerns


    正确答案: E,B
    解析: 暂无解析

  • 第22题:

    多选题
    When supporting multiple authentication domains, the domain map must be configured with which two options?()
    A

    hostname

    B

    static route

    C

    virtual router

    D

    loopback reference


    正确答案: C,B
    解析: 暂无解析

  • 第23题:

    多选题
    Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()
    A

    OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance

    B

    IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support

    C

    QoS requirements with MPLS-VPN must be implemented by the service provider

    D

    Hierarchical VPLS designs are the least scalable

    E

    IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required


    正确答案: A,C
    解析: 暂无解析