niusouti.com

单选题Given the following configuration:  port-profile type ethernet DATA-UPLINK   vmware port-group  switchport trunk allowed vlan 1-3967,4048-4093  channel-group auto mode on  no shutdown  state enabled  port-profile type ethernet MGMT-UPLINK  vmware port-

题目
单选题
Given the following configuration:  port-profile type ethernet DATA-UPLINK   vmware port-group  switchport trunk allowed vlan 1-3967,4048-4093  channel-group auto mode on  no shutdown  state enabled  port-profile type ethernet MGMT-UPLINK  vmware port-group    switchport trunk allowed vlan 10-12  channel-group auto mode on  no shutdown  state enabled       VEMs are seen to be joining and then are lost from the Cisco VSM. How would you resolve this issue?()
A

 Remove second NIC from each port profile

B

 Remove VEM from VSM (no vem X), remove NICs, and reinsert

C

 Ensure that VLANs on uplink profiles are not overlapping

D

 Reinstall VEM

E

 Issue the command module vem X execute vemcmd set pinning module vsm 1


相似考题
更多“Given the following configuration:  port-profile type ethern”相关问题
  • 第1题:

    An engineer has added the following configuration snippet to an implementation planning document. The configuration will be added to Router R1, whose Fa0/0 interface connects to a LAN to which Routers R2 and R3 also connect. R2 and R3 are already EIGRP neighbors with each of her. Assuming the snippet shows all commands on R1 related to EIGRP authentication, which answer lists an appropriate comment to be made during the implementation plan peer review?() key chain fred key 3 key - string whehew interface fa0/0 ip authenticat ion key - chain eigrp 9 fred

    • A、The configuration is missing one authentication - related configuration command
    • B、The configuration is missing two authentication - related configuration commands
    • C、Authentication type 9 is not supported; type 5 should be u sed insteaD
    • D、The key numbers must begin with key 1, so change the key 3 command to key 1

    正确答案:A

  • 第2题:

    which one of the following statements would lee include in an agent to limit the documents processed by the agent to those for which the value of the type field is "action"? ()

    • A、FIELD Type :="action"     
    • B、SELECT Type ="action" 
    • C、SELECT Type :="action "      
    • D、@if (type="action";@success;@failure) 

    正确答案:B

  • 第3题:

    When selecting a Network Interface Card (NIC), which of the following factors need to be considered?()

    • A、The type of application used on the network
    • B、The type of system bus used by the computers
    • C、The type of memory installed in each computer
    • D、The type of media used in the network topology
    • E、The type of protocols used in the network
    • F、The physical layout of the network hosts

    正确答案:B,D,F

  • 第4题:

    The following configuration exists on a router on one end of an IPv6 tunnel. Although the configuration added so far is correct, the configuration is incomplete. Which type of tunnel is most likely to be intended by the network engineer?() interface loopback 1 ip address 192.168.1.1 255.255.255.255 interface tunnel 2 ipv6 address 2002:C0A8:10 1::1/64 tunnel source loopback 1

    • A、Automatic 6to4
    • B、Manually configured tunnel
    • C、ISATAP
    • D、GRE

    正确答案:A

  • 第5题:

    Given the following output:  prompt> myapp   [1]+ Stopped myapp  prompt>   Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt?()

    • A、 bg myapp
    • B、 continue myapp
    • C、 exec myapp
    • D、 fg myapp
    • E、 myapp &

    正确答案:A

  • 第6题:

    Companycom is considering a partitioned solution which will require cumulative rPerf total of 150. The original sizing came back recommending a 32-way p5 590. However, they have a requirement for future scalability and availability is important. Which of the following would be the best reason to recommend a p5 595?()

    • A、The p5 595 would allow for COD
    • B、The p5 595 includes the Advanced Power Virtualization hardware and software
    • C、The p5 595 is priced the same as the p5 590 given the same number/type of CPUs
    • D、The p5 595 performance would be equivalent to the p5 590 given the same number/type of CPUs

    正确答案:A

  • 第7题:

    单选题
    Given the following router output,which configuration file will the router use at its next reload?()
    A

    config

    B

    clientqos.cnf

    C

    startup-config

    D

    running-configuration


    正确答案: D
    解析: 暂无解析

  • 第8题:

    单选题
    An engineer has added the following configuration snippet to an implementation planning document. The configuration will be added to Router R1, whose Fa0/0 interface connects to a LAN to which Routers R2 and R3 also connect. R2 and R3 are already EIGRP neighbors with each of her. Assuming the snippet shows all commands on R1 related to EIGRP authentication, which answer lists an appropriate comment to be made during the implementation plan peer review?() key chain fred key 3 key - string whehew interface fa0/0 ip authenticat ion key - chain eigrp 9 fred
    A

    The configuration is missing one authentication - related configuration command

    B

    The configuration is missing two authentication - related configuration commands

    C

    Authentication type 9 is not supported; type 5 should be u sed insteaD

    D

    The key numbers must begin with key 1, so change the key 3 command to key 1


    正确答案: D
    解析: 暂无解析

  • 第9题:

    单选题
    You have configured the following:  RMAN> CONFIGURE DEFAULT DEVICE TYPE TO ’sbt’; new RMAN configuration parameters:  CONFIGURE DEFAULT DEVICE TYPE TO ’sbt’; new RMAN configuration parameters are successfully stored RMAN> SHOW DEVICE TYPE; RMAN configuration parameters are: CONFIGURE DEVICE TYPE SBT PARALLELISM 1; # CONFIGURE DEVICE TYPE DISK PARALLELISM 1; #  RMAN> CONFIGURE DEVICE TYPE SET PARALLELISM 5;  RMAN> SHOW DEVICE TYPE; RMAN configuration parameters are: CONFIGURE DEVICE TYPE SBT PARALLELISM 5; CONFIGURE DEVICE TYPE DISK PARALLELISM 1; #  How many channels are allocated to SBT?()
    A

    0, because channels have not been defined.

    B

    3, as indicated by the degree of parallelism.

    C

    1, the default value when device is configured.

    D

    5, as indicated by the last parallelism command.


    正确答案: B
    解析: 暂无解析

  • 第10题:

    单选题
    Router R1 is redistributing between two OSPF processes. Given the configuration shown, which includes all commands in the route map named fred, which of the following answers is true regarding the redistribution into OSPF process 1?() router ospf 1 redistribute ospf 2 external 2 route - map fred ! route - map fred permit 10 match ip address 1 set metric - type type - 1
    A

    No routes are redistributed because a route cannot be both E1 and E2.

    B

    Only OSPF E2 routes in the OSPF 2 domain will be considered for redistribution.

    C

    Inside the OSPF 2 domain, any formerly E2 routes will become E1 routes.

    D

    Routes permitted by ACL 1 will be redistributed, regardless of whether the routes are E1 or E2 routes.


    正确答案: B
    解析: 暂无解析

  • 第11题:

    单选题
    which one of the following statements would lee include in an agent to limit the documents processed by the agent to those for which the value of the type field is "action"? ()
    A

    FIELD Type :=action     

    B

    SELECT Type =action 

    C

    SELECT Type :=action       

    D

    @if (type=action;@success;@failure) 


    正确答案: C
    解析: 暂无解析

  • 第12题:

    单选题
    Which of the following products and utilities can be used to update all encrypted data as well as the merchant key in a WebSphere Commerce database for a given instance?()
    A

    The Database Update Tool found in Configuration Manager

    B

    The LDAP Server

    C

    The WebSphere Application Server Administrative Console

    D

    The WebSphere Commerce SecurityUpdate Command

    E

    The WebSphere Commerce Administration Console


    正确答案: A
    解析: 暂无解析

  • 第13题:

    Given a Cisco Unified Computing System, which is a valid port type in end-host mode?()

    • A、 Server
    • B、 End device
    • C、 Node
    • D、 Host
    • E、 Virtual

    正确答案:A

  • 第14题:

    Which of the following products and utilities can be used to update all encrypted data as well as the merchant key in a WebSphere Commerce database for a given instance?()

    • A、The Database Update Tool found in Configuration Manager
    • B、The LDAP Server
    • C、The WebSphere Application Server Administrative Console
    • D、The WebSphere Commerce SecurityUpdate Command
    • E、The WebSphere Commerce Administration Console

    正确答案:A

  • 第15题:

    Given a host with two NICs assigned to a N1k profile,which topologies are suitable for this type of configuration () port-profile type Ethernet name VM-Data  vmware port-group  switchport mode trunk  switchport allowed vlan 400-410  channel-group auto mode active  no shut   state enabled      

    • A、 Cisco UCS fabric interconnects
    • B、 Pair of N5K’s in VPC
    • C、 Standalone N5K
    • D、 Pair of N5K’s in non-VPC
    • E、 Cisco Catalyst 6000 Switch in VSS

    正确答案:B,C,E

  • 第16题:

    Given the following configuration:  port-profile type ethernet DATA-UPLINK   vmware port-group  switchport trunk allowed vlan 1-3967,4048-4093  channel-group auto mode on  no shutdown  state enabled  port-profile type ethernet MGMT-UPLINK  vmware port-group    switchport trunk allowed vlan 10-12  channel-group auto mode on  no shutdown  state enabled       VEMs are seen to be joining and then are lost from the Cisco VSM. How would you resolve this issue?()

    • A、 Remove second NIC from each port profile
    • B、 Remove VEM from VSM (no vem X), remove NICs, and reinsert
    • C、 Ensure that VLANs on uplink profiles are not overlapping
    • D、 Reinstall VEM
    • E、 Issue the command "module vem X execute vemcmd set pinning module vsm 1"

    正确答案:C

  • 第17题:

    Which of the following are advantages of using Dynamic Host Configuration Protocol?()

    • A、IP addresses can be managed from a central point
    • B、Computers can automatically get new addressing when moved to a different network segment
    • C、Media Access Control addresses can be changed automatically
    • D、The network speed can automatically adjust based on the type of traffic being generated
    • E、The HOSTS file on the computer can be validated for proper entries

    正确答案:A,B

  • 第18题:

    Given the following MPLS L2 configuration command: mpls-relay 10.1.1.1 4 Which two statements true? ()(Choose two.)

    • A、This command is applied to the core router facing interface.
    • B、This command is applied to the customer facing interface.
    • C、The 4 is locally significant and identifies the layer 2 circuit.
    • D、The 4 must match exactly on the peer router configuration on the remote end.

    正确答案:B,D

  • 第19题:

    单选题
    Given the following configuration on the Paris PE router: routing-instance {VPN-A-Paris-Munich {instance-type vrf;interface so-6/0/0.0;interface so-6/0/1.0;route-distinguisher 65535:0;vrf-target target:65535:101;routing-options {static {route 172.16.0.0/16 next-hop so-6/0/0.0;route 172.17.0.0/16 next-hop so-6/0/1.0;} Which community value would the Munich PE router match against in an import policy associated with this VPN?()
    A

    101

    B

    65535:0

    C

    65535:101

    D

    target:65535:101


    正确答案: C
    解析: 暂无解析

  • 第20题:

    单选题
    Given the following configuration, what command can be used to determine the physical path that traffic will be sent out upon?()  Port-profile type Ethernet name vm-data   Switchport mode trunk  Switchport trunk allowed vlan 200-210   Channel-group auto mode on mac-pinning   State enabled  Vmware port-group  No shut  Port-profile type vethernet name vlan-200   Switchport mode access  Switchport vlan 200   State enabled Vmware port-group No shut
    A

     module vem X execute vemcmd show trunk

    B

     show module 3 internal pinning

    C

     module vem X execute vemcmd show port

    D

     show module vem mapping

    E

     show interface vethX pinning


    正确答案: E
    解析: 暂无解析

  • 第21题:

    多选题
    Given the following MPLS L2 configuration command: mpls-relay 10.1.1.1 4 Which two statements true? ()(Choose two.)
    A

    This command is applied to the core router facing interface.

    B

    This command is applied to the customer facing interface.

    C

    The 4 is locally significant and identifies the layer 2 circuit.

    D

    The 4 must match exactly on the peer router configuration on the remote end.


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    单选题
    Which of the following should an administrator do after running a command from the console onthe perimeter router?()
    A

    Update the configuration logs

    B

    Update the network wiring schematics

    C

    Update the network configuration procedures

    D

    Compare the configuration with the baseline


    正确答案: D
    解析: 暂无解析

  • 第23题:

    单选题
    Given the following output:  prompt> myapp   [1]+ Stopped myapp  prompt>   Which of the following commands will resume executing the stopped process while allowing the user to continue to type commands at the command prompt?()
    A

     bg myapp

    B

     continue myapp

    C

     exec myapp

    D

     fg myapp

    E

     myapp &


    正确答案: B
    解析: 暂无解析

  • 第24题:

    多选题
    Given a host with two NICs assigned to a N1k profile,which topologies are suitable for this type of configuration () port-profile type Ethernet name VM-Data  vmware port-group  switchport mode trunk  switchport allowed vlan 400-410  channel-group auto mode active  no shut   state enabled
    A

    Cisco UCS fabric interconnects

    B

    Pair of N5K’s in VPC

    C

    Standalone N5K

    D

    Pair of N5K’s in non-VPC

    E

    Cisco Catalyst 6000 Switch in VSS


    正确答案: E,A
    解析: 暂无解析