單項選擇題A virtual storage area network (VSAN) is a collection of ports from a set of connected FibreChannel switches, that form a virtual fabric. Which technology allows centralized storage services to be shared across different VSANs?()

A. IVR
B. FSPF
C. FICON
D. SANTap


您可能感興趣的試卷

你可能感興趣的試題

2.單項選擇題A network vulnerability scanner is part of which critical element of network and system security?()

A. host security
B. perimeter security
C. security monitoring
D. policy management

3.單項選擇題You are the Cisco Network Designer in Cisco.com. You are designing an e-Commerce module,which routing statement is correct?()

A. Routing is mostly static.
B. Hardcoded IP addresses are used to support failover.
C. Inbound servers use the CSM or ACE as the default gateway.
D. VLANs between the access layer switches are used for FHRP protocols.

7.多項選擇題Which two statements are true about MLP interleaving? ()

A. It fragments and encapsulates all packets in a fragmentation header.
B. Packets smaller than the fragmentation size are interleaved between the fragments of thelarger packets.
C. Packets larger than the fragmentation size are always fragmented, and cannot be interleaved,even if the traffic is voice traffic.
D. It fragments and encapsulates packets that are longer than a configured size, but does not encapsulate smaller packets inside a fragmentation header.

8.單項選擇題ou are the Cisco Network Designer in Cisco.com. Which of these practices should you followwhen designing a Layer 3 routing protocol?()

A. Never peer on transit links.
B. Build squares for deterministic convergence.
C. Build inverted U designs for deterministic convergence.
D. Summarize routes at the distribution to the core to limit EIGRP queries or OSPF LSA propagation.

9.單項選擇題Which statement about CiscoWorks 2000 Inventory Manager is true?()

A. It uses SNMP v1.
B. It scans devices for hardware information.
C. It scans and records the operational status of devices.
D. When the configuration of a device changes, the inventory is automatically updated.

10.多項選擇題

Which two characteristics are true of a firewall running in routed mode based on the following information?()

A. FWSM routes traffic between the VLANs.
B. FWSM switches traffic between the VLANs.
C. Routed mode is often called bump-in-the-wire mode.
D. Routed mode firewall deployments are used most often in current designs.

最新試題

Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()

題型:單項選擇題

Which two of these correctly describe asymmetric routing and firewalls? ()

題型:多項選擇題

At a certain customer’s site, a NAS is both physically and logically in the traffic path. The NAS identifies clients solely based on their MAC addresses. In which access mode has this NAS been configured to operate?()

題型:單項選擇題

In a VoWLAN deployment, what is the recommended separation between cells with the same channel?()

題型:單項選擇題

Which path selection protocol is used by Fibre Channel fabrics?()

題型:單項選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:單項選擇題

Which two statements about zoning are correct?()

題型:多項選擇題

Which two statements about an interface configured with the asr-group command are correct? ()

題型:多項選擇題

What are two characteristics of GSS? ()

題型:多項選擇題

To ensure quality, what is the maximum end-to-end transit time in milliseconds on a voice network?()

題型:單項選擇題