A. Ethernet Private Line
B. Ethernet Wire Service
C. Ethernet Relay Service
D. Ethernet Multipoint Service
E. Ethernet Relay Multipoint Service
您可能感興趣的試卷
你可能感興趣的試題
A. Ethernet Private Line
B. Ethernet Wire Service
C. Ethernet Relay Service
D. Ethernet Multipoint Service
E. Ethernet Relay Multipoint Service
A. Adjust the default hello timers to three seconds for aggressive mode.
B. Enable it in global mode and on every interface you need to support.
C. Enable it in global mode to support every individual fiber-optic interface.
D. Enable it to create channels containing up to eight parallel links between switches.
E. Enable it in global mode to support every individual fiber optic and Ethernet interface.
A. use ISL encapsulation
B. use 802.1q encapsulation
C. set ISL to desirable and auto with encapsulation negotiate to support ILS protocol negotiation
D. use VTP server mode to support dynamic propagation of VLAN information across the network
E. set DTP to desirable and desirable with encapsulation negotiate to support DTP protocol negotiation.
A. to ensure a loop-free topology
B. to protect against user-side loops
C. in order to support business applications
D. because of the risk of lost connectivity without STP
E. for the most deterministic and highly available network topology
A. when HSRP is not supported by the design
B. when multiple vendor devices need to be supported
C. when preempt tuning of the default gateway is needed
D. when a robust method of backing up the default gateway is needed
E. when the design implements Layer 2 between the access switch and the distribution switch
F. when the design implements Layer 3 between the access switch and the distribution switch
A. map the Layer 2 VLAN number to the Layer 3 subnet
B. control route propagation to edge switches using distribute lists
C. use a Layer 2 distribution interconnection link with HSRP or GLBP
D. use a Layer 3 distribution interconnection link with HSRP or GLBP
E. use equal-cost Layer 3 load balancing on all links to limit the scope of queries in EIGRP
A. It will only become active after a software failure.
B. It will only become active after a hardware failure.
C. It requires that Cisco NSF be enabled in order to work successfully.
D. It synchronizes the MAC, FIB, and adjacency tables between Active and Standby Route Processors.
A. Utilizing Cisco NSF in Layer 2 environments can reduce outages to one to three seconds.
B. Utilizing SSO in Layer 3 environments can reduce outages to one to three seconds.
C. Distribution switches are single points of failure causing outages for the end devices.
D. Utilizing Cisco NSF and SSO in a Layer 2 environment can reduce outages to less than one second.
E. NSF and SSO with redundant supervisors have the most impact on outages at the access layer.
A. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 2 link
B. to a core switch running Cisco NSF and SSO from redundant distribution switches connected with a Layer 3 link
C. to two core switches from redundant distribution switches connected with a Layer 2 link
D. to two core switches from redundant distribution switches connected with a Layer 3 link
E. to two core switches running Cisco NSF and SSO from two redundant distribution switches running Cisco NSF and SSO
A. RX-queue deferred
B. TX-queue deferred
C. RX-queue saturation
D. TX-queue saturation
E. RX-queue starvation
F. TX-queue starvation
最新試題
You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()
Which two of these are advantages of placing the VPN device in the DMZ on the firewall?()
Which two of these are advantages of placing the VPN device parallel to the firewall?()
Which of the following is the primary consideration to scale VPNs?()
What is the recommended radius of a cell for a voice-ready wireless network?()
Client traffic is being bridged through LAN interfaces on two WLCs. Which roaming option will keep them on the same IP subnet?()
What amount of cell overlap ensures smooth roaming for wireless endpoints?()
What is the recommended practice when considering VPN termination and firewall placement?()
You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
What is the term for a logical SAN which provides isolation among devices physically connected to the same fabric?()