A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with a Layer 2 link
D. to two core switches from redundant distribution switches connected with a Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
第1题:
You are at a client site. It is a medium-sized business and needs a Cisco Catalyst switch that offers high availability and security. What type of Catalyst switches would you recommend?()
第2题:
Attaching to a NAS storage system through redundant NICs will provide which of the following?()
第3题:
You are about to design a very fast convergence time on a service provider network. Which feature wouldyou utilize to declare a link failure within less than two seconds of the fault on a link?()
第4题:
A network administrator needs to force a high-performance switch that is located in the MDF to become the root bridge for a redundant path switched network. What can be done to ensure that this switch assumes the role as root bridge()。
第5题:
You are charged with implementing a secure wireless installation which will provide Internet accessto client devices but will not allow communications between wireless clients. In addition to implementing PSPF or peer-to-peer blocking on the wireless side. Which of the following actions should you perform on the wired infrastructure?()
第6题:
You are a professional level SQL Server 2005 database administrator in an international corporation named Wiikigo. You are experienced in implementing high-availability solutions, monitoring the database server, and design deployment. In the company, you major job is the deployment, maintenance and support of Microsoft SQL Server 2005. You work as a database administrator for your company. More than a month ago, the SQL 2005 Server computer is deployed in operation. There are some query performance problems last week. Therefore, you perform an investigation on the locking contention. From the sys.dm_os_wait_stats dynamic management view (DMV), you can see a high value in the max_wait_time_ms column. You want to check out whether this value is a factor which leads to the current performance problems. In addition, the impact on database users should e cut to the least. Which action should be performed to achieve the goal?()
第7题:
GeoRM
HACMP/XD://PPRC
HACMP/XD://GPFS
HACMP/XD://HAGEO
第8题:
To achieve the goal, DBCC DBREINDEX should be utilized.
To achieve the goal, SELECT * FROM sys.indexes should be utilized.
To achieve the goal, SELECT * FROM sys.dm_db_index_physical_stats should be utilized.
To achieve the goal, DBCC INDEXDEFRAG should be utilized.
第9题:
link-state protocol
path-vector protocol
Bellman-Ford protocol
distance-vector protocol
第10题:
failover clustering
Network Load Balancing
Windows Server 2003, Standard Edition
Windows Server 2003, Enterprise Edition
第11题:
to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
to two core switches from redundant distribution switches connected with Layer 2 link
to two core switches from redundant distribution switches connected with Layer 3 link
to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
第12题:
Catalyst 2960 Series
Catalyst 3750 Series
Catalyst 4900 Series
Catalyst 6500 Series
第13题:
You want your Catalyst switch to implement a switching method that holds a packet in its memory until the data portion of the respected packet reaches the switch.Which method should you employ on your Catalyst switch?()
第14题:
Attaching to a SCSI storage system through redundant paths will provide which of the following?()
第15题:
ou are the Cisco Network Designer in Cisco.com. Which of these practices should you followwhen designing a Layer 3 routing protocol?()
第16题:
Which of the following is true concerning best design practices at the switched Access layer of thetraditional layer2 Enterprise Campus Network?()
第17题:
During a planning session, the customer indicates the need to provide high availability between a Node attached to an IBM TotalStorage Enterprise Storage Server and a remote node attached to a IBM TotalStorage FAStT server with automatic fallover in the event of a disaster. Which of the following HACMP options will provide this functionality?()
第18题:
You work as the IT professional in an international company which is named Wiikigo. You are experiencedin implementing and administering a network operating system. You are specialized in deploying servers,configuring Windows Server 2008 Terminal services and network application services, and configuring aweb services infrastructure. Your company runs Terminal Services. You intend to install an application update for the lobapp.exe application on the Terminal Server. You find instances of the lobapp.exeprocesses left behind by users who have disconnected. In order to make sure that you can perform anapplication update, you have to terminate all instances of the lobapp.exe processes. In order to achievethis,what action should you perform?()
第19题:
RIP
BGP
OSPF
EIGRP
第20题:
heap tables
object tables
partitioned tables
indexorganized tables (IOTs)
第21题:
In order to achieve this, you should view the Event Viewer Security log.
In order to achieve this, you should view the Event Viewer Application log.
In order to achieve this, you should view the Event Viewer Terminal Services-Gateway log.
In order to achieve this, you should view the events in the Monitoring folder from the TS Gateway Manager console.
第22题:
Never peer on transit links.
Build squares for deterministic convergence.
Build inverted U designs for deterministic convergence.
Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.
第23题:
SVI interface
Access port
EtherChannel port channel
Loopback interface
Routed port
BVI interface