多項選擇題An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()

A.change the EtherChannel default hashing algorithm from XOR to use source port Layer 4 port load balancing to better load balance the traffic
B.change the EtherChannel default hashing algorithm from XOR to use destination Layer 4 port load balancing to better load balance the traffic
C.have the application recoded to use multiple connections instead of a single connection so EtherChannel can better load balance the traffic
D.upgrade the CPU and memory of the compute devices so they can better process traffic
E.upgrade the EtherChannel bundle to a single gigabit link because EtherChannel is not well suited for single-connection traffic


您可能感興趣的試卷

你可能感興趣的試題

1.多項選擇題Which two attributes need to match for two switches to become members of the same MST region?  ()

A.the table of 4096 elements that map the respective VLAN to STP instance number
B.VTP version
C.configuration revision number
D.native VLAN ID

7.單項選擇題Which statement is correct about an OSPF sham-link?()

A.A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.
B.A sham-link is a logical link between PE routers that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.
C.A sham-link is a logical link between PE routers that carries OSPF LSAs and forwards customer traffic across it.
D.A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and carries OSPF LSAs.
E.A sham-link is a point-to-multipoint link that provides an OSPF adjacency between the PE routers and forwards customer traffic across it.

8.單項選擇題Which router is doing LSA type 7 to type 5 translation,and why?()

A.Both RTA and RTB will do LSA7/5 translation,since they are both NSSA ABRs
B.RTA will do LSA7/5 translation,since it has the lower router ID
C.RTB will do LSA7/5 translation,since it has the higher router ID
D.The redistributing router will do LSA7/5 translation,since it is within the NSSA

9.單項選擇題What does the OSPF command capability vrf-lite achieve?()

A.It enables provider edge (PE) specific checks on a router when the OSPF process is associated with the VRF
B.It disables provider edge (PE) specific checks on a router when the OSPF process is associated with the VRF
C.It enables the exchange of the "VRF-Lite" capability when the OSPF adjacency is formed.
D.It disables the MPLS processing on the OSPF learned routes inside the VRF

10.單項選擇題Which statement best describes OSPF external LSAs (type 5)?()

A.OSPF external LSAs are automatically flooded into all OSPF areas, unlike type 7 LSAs, which require that redistribution be configured.
B.External LSAs (type 5) are automatically changed to type 1 LSAs at ASBRs.
C.Type 5 LSAs are route summaries describing routes to networks outside the OSPF Autonomous System.
D.External network LSAs (type 5) redistributed from other routing protocols into OSPF are not permitted to flood into a stub area

最新試題

Which three are needed to run VRF lite for IPv6 on a router? ()

題型:多項選擇題

Which QoS mechanism can help classify different kinds of Citrix traffic (print job versus real-time terminal control)?()

題型:單項選擇題

Which statement is true of a source that wants to transmit multicast traffic to group 239.1.1.1?()

題型:單項選擇題

In which way can the IPv6 address of 2031:0000:130F:0000:0000:09C0:876A:130B be expressed most efficiently?()

題型:單項選擇題

What are the "bound IP addresses" used for in LDP?()

題型:單項選擇題

Which router is doing LSA type 7 to type 5 translation,and why?()

題型:單項選擇題

What is the command to configure RSVP to reserve up to one-tenth of a Gigabit link, but only allow each individual flow to use 1 MB/s?()

題型:單項選擇題

Which IOS security feature is configured by the ip inspect inspection-name {in  out} command?()

題型:單項選擇題

Policy-based routing allows network administrators to implement routing policies to allow or deny paths based on all of these factors except which one?()

題型:單項選擇題

Internet Protocol version 6 (IPv6) is the next-generation Internet Layer protocol for packet-switched internetworks and the Internet. IPv6 router solicitation is()

題型:單項選擇題