Two peer devices: the vPC peers of which one is primary and one is secondary and are part of a vPC domain.
A Layer 3 Gigabit Ethernet link called peer-keepalive link to resolve dual-active scenarios
A redundant 10 Gigabit Ethernet PortChannel called a peer link to carry traffic from one system to the other when needed
vPC member ports forming the PortChannel
A dot1q trunk between the vPC peers
A management port that can be used as peer-keepalive link to resolve dual-active scenarios.
第1题:
Ezonexam has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?
A.VTP will allow physically redundant links while preventing switching loops
B.VTP will allow switches to share VLAN configuration information
C.VTP will allow a single port to carry information to more than one VLAN
D.VTP will allow for routing between VLANs
E.None of the above
第2题:
A. InterSwitch Link
B. Virtua LAN
C. Virtual Output Queuing
D. virtual storage area network
第3题:
You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.
You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.
Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.
You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)
A.Configure the IIS virtual directory to allow URL queries.
B.Configure the IIS virtual directory to allow template queries.
C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.
D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.
E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.
第4题:
What is the function performed by LSA Type 1?()
第5题:
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
第6题:
A. Administratively shut down the interface.
B. Physically secure the interface.
C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.
D. Configure a virtual terminal password and login process.
E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.
第7题:
You have finished physically installing an access point on the ceiling at your office. At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()
A. AES
B. PSK
C. SSID
D. TKIP
E. WEP
第8题:
A. profile
B. domain map
C. IP access-route
D. static IP addressing
第9题:
You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()
A.AES
B.PSK
C.SSID
D.TKIP
E.WEP
第10题:
You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()