A. ensure a loop-free topology
B. protect against user-side loops
C. support business applications
D. risk of lost connectivity without STP
第1题:
You are the network administrator of a Layer 3 switched network. Users in one VLAN are complaining that access to the server VLAN is very slow from time to time. Traffic in the local VLAN works without any issue, and users in other VLANs do not have any complaint to reach the server VLAN. What is most likely the cause of this issue?()
第2题:
Why is STP required when VLANs span access layer switches?()
第3题:
Which statement about data center access layer design modes is correct?()
第4题:
If it is properly deployed, a controller-based access point is capable of monitoring all vlans on a network when you select which of the following modes from the ap mode drop-down menu on the controller?()
第5题:
You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module, which routing statement is correct?()
第6题:
You are the Cisco Network Designer in Cisco.com. Which two statements about Layer 3 access designs are correct?()
第7题:
Which statement about data center access layer design modes is correct?()
第8题:
Your network contains a wireless access point. You have a computer that runs Windows 7. The computerconnects to the wireless access point. You disable Service Set Identifier (SSID) broadcasts on the wirelessaccess point. You discover that you are now unable to connect to the wireless access point from theWindows 7 computer. You need to ensure that the computer can connect to the wireless access point. What should you do?()
第9题:
Network management
Network optimization
Network security
Content storage networking
第10题:
Routing should occur at the access layer ifvoice VLANs are utilized. Otherwise, routing should occur at the distribution layer.
Routing should always be performed at the distribution layer.
VLANs should be localized to a switch.
VLANs should be localized to a single switch unlessvoice VLANs are being utilized.
Routing should not be performed between VLANs located on separate switches.
第11题:
Routing is mostly static.
Hardcoded IP addresses are used to support failover.
Inbound servers use the CSM or ACE as the default gateway.
VLANs between the access layer switches are used for FHRP protocols.
第12题:
The access layer is the first oversubscription point in a data center design.
When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
When using a Layer 3 design, stateful services requiring Layer 2 connectivity are provisionedfrom the aggregation layer.
The data center access layer provides the physical-level connections to the server resourcesand only operates at Layer 3.
第13题:
You are the Cisco Network Designer in Cisco.com. Which layer NAS operating mode are ACLfiltering and bandwidth throttling only provided during posture assessment?()
第14题:
You are the network consultant from passguide.com. Could you please tell customers what strategy will protect network resources and services from unauthorized actions?()
第15题:
You are the network consultant from Cisco.com. Please point out two statements correctly describe an IPS device()
第16题:
You are the network consultant from Cisco.com. Please point out which Layer 2 access designs does not support VLAN extensions?()
第17题:
While troubleshooting a connectivity problem on the network, you issue the ping command from your PC command prompt, but the output shows "request times out."At which OSI layer is this problem associated with?()
第18题:
You need to design the VLAN scheme for the Company network. Which two statements are true about best practices in VLAN design?()
第19题:
You have a computer that runs Windows XP Professional. The computer has an 802. 11g wireless network card. You have a wireless access point that is secured by using WiFi Protected Access (WPA). The service set identifier (SSID) of the wireless access point does not broadcast. You need to establish a wireless connection to the wireless access point. What should you do?()
第20题:
ensure a loop-free topology
protect against user-side loops
support business applications
risk of lost connectivity without STP
第21题:
to ensure a loop-free topology
to protect against user-side loops
in order to support business applications
because of the risk of lost connectivity without STP
for the most deterministic and highly available network topology
第22题:
From Credential Manager, modify the generic credentials.
From Credential Manager, modify the Windows credentials.
From Network and Sharing Center, turn on Network discovery.
From Network and Sharing Center, modify the wireless network connection settings.
第23题:
They do not receive unique IP addresses.
RADIUS or LDAP is required.
They are assigned addresses from the internal DHCP pool.
Their traffic appears to originate from the originating host network.