A.RFP
B.RFC
C.SLC/SLA
D.SOW
第1题:
If the OSPF protocol is used to connect customer edge (CE) routers to service provider edge(PE) routers in the VPN backbone, which two options best describe the use of SHAM links?()
第2题:
Which technology is an example of the need for a designer to clearly define features and designedperformance when designing advanced WAN services with a service provider?()
第3题:
Which VPN router does not contain customer routing knowledge?()
第4题:
When IPv6 is deployed by a Service Provider to bring on an IPv6 Enterprise, which transition strategyworks the best?()
第5题:
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()
第6题:
Which statement correctly describes a situation in which VRFs are used in the data center?()
第7题:
A technician is troubleshooting a lack of Internet connectivity affecting their entire office. The technician suspects the issue is with their Internet Service Provider failing to provide service.Which of the following command line tools should the technician use to BEST test this theory?()
第8题:
In the customer’s environment, a group of five employees work within a room that has three PCs. The PCs have excellent hardware configurations, with considerable RAM and a fast CPU. The employees use these PCs only when they need to access an application, which is for a short duration of time. For the rest of the time, they work with their tools on their desks. Which IBM Tivoli Access Manager for Enterprise Single Sign-On session management configuration should be used for these three PCs for optimum performance?()
第9题:
always for LNS
always for LAC
LAC with fragmentation in the tunnel
LNS when there are greater than 2000 sessions
第10题:
Brocade Enterprise 20-port 8Gb SAN switch module
Brocade 20-port8Gb SAN switch module and Brocade Advanced Performance Monitoring for IBM BladeCenter
Brocade Enterprise 10-port 8Gb SAN switch module
Brocade 10-port8Gb SAN switch module and Brocade Advanced Performance Monitoring for IBM BladeCenter
第11题:
FHRP to remote branches.
Layer 3 MPLS VPNs routing.
Control protocols (for example Spanning Tree Protocol) for a Layer 3 MPLS service.
Intrusion prevention, QoS, and stateful firewall support network wide.
第12题:
Layer 2 access link QoS design
enterprise-to-service-provider mapping models
Layer 3 link access QoS design
service provider service level agreements
Layer 2 link access load balancing
第13题:
When you design QoS on CE for an MPLS Layer 2 VPN, which three things should be considered?()
第14题:
The network administrator must complete the connection between the RTA of the XYZ Company and the service provider. To accomplish this task, which two devices could be installed at the customer site to provide a connection through the local loop to the central office of the provider (Choose two.)()。
第15题:
Which type of VPN router is not required to run MPLS?()
第16题:
Which two restrictions must the Enterprise Campus network designer consider when evaluatingWAN connectivity options? ()
第17题:
What is the result when all Cisco Enterprise Campus Architecture components are designed withinteroperability in mind? ()
第18题:
The Cisco Enterprise Campus Architecture increases the effectiveness of networked applications and services on campus, enabling enterprises to grow their business and stay ahead. What is the outcome of designing all its components with taking interoperability into consideration?()
第19题:
A banking customer deployed an IBM BladeCenter chassis with one Brocade 8Gb SAN switch module. The customer requires an 8Gb uplink or higher. Which configuration will meet this request?()
第20题:
Windows NT Connector
Generic (LDAP) Connector
Network Information Service Connector
Active Directory Service Interfaces Connector
第21题:
Reports
Compliance
Support Workbench
Asset Discovery
visual creation of JDBC DataSource object to Oracle RAC
第22题:
RFP
RFC
SLC/SLA
SOW
第23题:
OSPF over multicast EMS or VPLS network may not have consistent broadcast or multicastperformance
IP multicast is not supported over Lover 3 MPLS VPN; instead a Layer 2 MPLS WN must beutilized with service provider support
QoS requirements with MPLS-VPN must be implemented by the service provider
Hierarchical VPLS designs are the least scalable
IGMP snooping is not on option with VPLS or EMS; instead administrative scoping or allowingsufficient bandwidth for unnecessary multicast traffic at the edge links is required