Virtual PortChannels (vPCs) allow links that are physically 

题目
多选题
Virtual PortChannels (vPCs) allow links that are physically connected to two different Cisco switches to appear to a third downstream device as coming from a single device and as part of a single port channel. Which of the following are components of a Virtual PortChannel system? ()
A

Two peer devices: the vPC peers of which one is primary and one is secondary and are part of a vPC domain.

B

A Layer 3 Gigabit Ethernet link called peer-keepalive link to resolve dual-active scenarios

C

A redundant 10 Gigabit Ethernet PortChannel called a peer link to carry traffic from one system to the other when needed

D

vPC member ports forming the PortChannel

E

A dot1q trunk between the vPC peers

F

A management port that can be used as peer-keepalive link to resolve dual-active scenarios.

参考答案和解析
正确答案: A,C
解析: 暂无解析
如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

Ezonexam has implemented the use of the Virtual Trunking Protocol (VTP). Which statement below accurately describes a benefit of doing this?

A.VTP will allow physically redundant links while preventing switching loops

B.VTP will allow switches to share VLAN configuration information

C.VTP will allow a single port to carry information to more than one VLAN

D.VTP will allow for routing between VLANs

E.None of the above


正确答案:B

第2题:

You are the Cisco Network Designer in Cisco.com. What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

A. InterSwitch Link

B. Virtua LAN

C. Virtual Output Queuing

D. virtual storage area network


参考答案:D

第3题:

You are the administrator of two Microsoft Windows 2000 computers. One computer is running Internet Information Services (IIS), and the other is running SQL Server 2000. Company partners need to connect by means of the Internet and query data stored on the SQL Server computer. Some of these partners have computers that do not use Microsoft operating systems or Web browsers.

You need to configure the IIS and SQL Server 2000 computers to allow access to data by means of the IIS virtual directory. IIS uses Basic Authentication to allow access to the virtual directory.

Only company partners should have access to the SQL Server computer by means of the Internet. The partners should not be allowed to make ad hoc queries. You want to be able to audit successful and failed logins to the SQL Server computer.

You want to allow the partners access to the SQL Server computer while keeping your security scheme as simple as possible. Which two actions should you take? (Each correct answer represents part of the solution. Choose two.)

A.Configure the IIS virtual directory to allow URL queries.

B.Configure the IIS virtual directory to allow template queries.

C.Create a new Windows user account. Create a corresponding Windows Authenticated login on the SQL Server computer. Configure the IIS virtual directory to always use this login when connecting to the SQL Server computer.

D.Create a Windows Authenticated login on the SQL Server computer for the IIS Internet Guest Account. Configure the IIS virtual directory to always use the Internet Guest Account when connecting to the SQL Server computer.

E.Create a Windows Authenticated login for each company partner on the SQL Server computer. Configure the IIS virtual directory to use Windows Integrated Authentication when connecting to the SQL Server computer.


正确答案:BE
解析:Explanation:B:TheAllowTemplateQueriesoptionletsyoucreateXMLtemplatesthatcontainSQLstatements,whichcanbeusedtoreturndataasXML.Nobrowserwouldberequired,thoughyoucouldcertainlyuseone.Apossiblenon-browserclientcouldbeaVisualBasicapplicationforexample.E:IfyouforcetheuserstoauthenticatethemselvesviaBasicauthentication,IIShasallinformationrequiredtomakethetrustedconnectiontoSQLServer.WesetupIIStouseWindowsIntegratedAuthenticationwhenconnectingtotheSQLServer.WindowsAuthenticationloginsmustbecreatedontheSQLServeraswell.Incorrectanswers:A:URLqueriesallowexecutionofSQLqueriesdirectlyintheURL.Thiswouldrequireabrowserhowever,butnotallpartnersusebrowsers.Note:TheAllowURLQueriesoptionletsyoutypeSelectstatementsdirectlyinthebrowserandreturnthedataasXML.C:TheInternetGuestAccount,notaspecificWindowsaccount,shouldbeusedtoconnecttotheSQLServerfromtheIISserver.D:WeshouldnotallowaccesstotheSQLServerfortheIISInternetGuestaccount.ThatwouldallowallpeopleconnectingtotheIISserveraccesstotheSQLServeraswell.

第4题:

What is the function performed by LSA Type 1?()

  • A、Create virtual links.
  • B、Advertise external prefixes.
  • C、Summarize routes between areas.
  • D、Advertise a router's interfaces and metrics.

正确答案:D

第5题:

What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


参考答案:D, E

第6题:

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

A. Administratively shut down the interface.

B. Physically secure the interface.

C. Create an access list and apply it to the virtual terminal interfaces with the access-group command.

D. Configure a virtual terminal password and login process.

E. Enter an access list and apply it to the virtual terminal interfaces using the access-class command.


参考答案:D, E

第7题:

You have finished physically installing an access point on the ceiling at your office. At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()

A. AES

B. PSK

C. SSID

D. TKIP

E. WEP


参考答案:C

第8题:

Which configuration component is required to allow a PPP over ATM client to connect to one virtual router for a particular session and to a different virtual router for another session?()

A. profile

B. domain map

C. IP access-route

D. static IP addressing


参考答案:A

第9题:

You have finished physically installing an access point on the ceiling at your officE.At a minimum, which paramenter must be configured on the access point in order to allow a wireless client to operate on it?()

A.AES

B.PSK

C.SSID

D.TKIP

E.WEP


参考答案:C

第10题:

You wish to increase the security of all of the routers within your network. What can be done to secure the virtual terminal interfaces on a router?()

  • A、Administratively shut down the interface.
  • B、Physically secure the interface.
  • C、Create an access list and apply it to the virtual terminal interfaces with the access-group command.
  • D、Configure a virtual terminal password and login process.
  • E、Enter an access list and apply it to the virtual terminal interfaces using the access-class command.

正确答案:D,E

更多相关问题