單項選擇題Which protocol would provide block access to remote storage over WAN links?()

A.iSCSI
B.FCIP
C.SCSI-FP
D.eSCSI


您可能感興趣的試卷

你可能感興趣的試題

3.單項選擇題In base e-Commerce module designs, where should firewall perimeters be placed?()

A. core layer
B. Internet boundary
C. aggregation layer
D. aggregation and core layers
E. access and aggregation layers


4.多項選擇題Which three best practices should be implemented at the campus backbone submodule to support the server farm module?()

A. Implement highly redundant switching and links with no single points or paths of failure.
B. Implement server load balancing.
C. Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D. Implement intrusion detection with automatic notification of intrusion attempts in place.

5.多項選擇題Cisco IDS sensors form the eyes and ears of your Cisco network intrusion detection system.Placing sensors correctly throughout your network is crucial to successfully implementing your Cisco intrusion detection system .Which two of these are characteristics of an IDS sensor?()

A. has a permissive interface that is used to monitor networks
B. is an active device in the traffic path
C. passively listens to network traffic
D. has a promiscuous interface that is used to monitor the network

8.單項選擇題Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?()

A. dynamic reconfiguration
B. path MTU discovery
C. auto setup
D. remote management

9.多項選擇題

Which two of these are correct regarding the recommended practice for distribution layer design based on the following configuration?()

A. use a Layer 2 link between distribution switches
B. use a Layer 3 link between distribution switches
C. use a redundant link to the core
D. use a Layer 3 link between distribution switches with route summarization

最新試題

Which technology allows centralized storage services to be shared across different VSANs?()

題型:單項選擇題

The Cisco NAC Appliance is able to check which three items before allowing network access?()

題型:多項選擇題

Please match the Cisco STP enahancement term to its definition.()(1) BPDU guard(2) PortFast(3) BackboneFast(4) Loop guard(5) Root guard(a) shuts down a port that receives a BPDU when enabled(b) cuts convergence time by mas-age for indirect failure(c) prevents the aliernate or root port from being designated in absence of BPDUs(d )causes Layer 2 LAN interface access port to immediately enter the forwarding state(e) helps prevent bridging loops due to jni-directional link failures on point-to-point links

題型:單項選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:單項選擇題

What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()

題型:單項選擇題

Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()

題型:多項選擇題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:單項選擇題

As an experienced technician, you are responsible for Technical Support. A customer calls to ask the best signal level and noise level for cell phone. How to respond?()

題型:單項選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:單項選擇題

As an experienced technician, you are responsible for Technical Support. Which of the following descriptions is correct about the characteristic of SLB one arm mode?()

題型:單項選擇題