urlhash
backup chaining
least connections
fewest outstanding requests
第1题:
Which two queuing methods are supported by outbound QoS?() (Choose two.)
第2题:
What are two functions that the parameter max-session performs? ()(Choose two.)
第3题:
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
第4题:
Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
第5题:
Log on to one of the cluster nodes and run the wlbs disable all command.
Open the Network Load Balancing Clusters console and delete the default port rules.
Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
第6题:
performance
authorization
compression
protocol validation
UDP load balancing
第7题:
LAN
QoS
traffic
IPSec
第8题:
Itsendsdataincleartextformat.
ItisnolongersupportedonCisconetworkdevices.
ItismoresecurethanSSH
Itrequiresanenterpriselicenseinordertobeimplemented.
ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.
第9题:
Defines the session limit for the domain.
Defines the session limit for the tunnel instance.
Used to control load balancing between multiple domains.
Used to control load balancing between multiple tunnels for a domain.
第10题:
Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
Run the wlbs disable command on the cluster nodes
Assign a unique port rule for NLB cluster by using the NLB Cluster console
Delete the default port rules through Network Load Balancing Cluster console
第11题:
SSL
SSH
Telnet
HTTP
第12题:
increased administration
improved availability
reduced backup
increased security
greater storage demand
第13题:
Which two secure remote access methods are available on the WX platforms?() (Choose two.)
第14题:
You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain. You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully. To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster. You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster. You want to add the port rule to the nodes of the cluster. What should you do? ()
第15题:
You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()
第16题:
Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com. You also discover that there is only one port rule configured for Network Load Balancing cluster. You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only. Which two actions should you perform to achieve this objective()
第17题:
protocol list
MIME
block list
extension
第18题:
urlhash
backup chaining
least connections
fewest outstanding requests
第19题:
SSH
Telnet
WebView
device front panel
serial console (command-line interface)
第20题:
CLI
J-Web
JUNOScope
PCMCIA flash card
第21题:
ATM
IDS
IOS
IOX
IPS
SDM
第22题:
Log on to one of the cluster nodes and run the wlbs disable all command.
Open the Network Load Balancing Clusters console and delete the default port rules.
Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.
第23题:
multihop
communities
confederations
route reflection
第24题:
weighted fair priority
weighted fair queuing
weighted strict priority
weighted strict queuing