多項(xiàng)選擇題Which two statements about zoning are correct? ()

A. Zoning increases security.
B. DNS queries are used for software zoning.
C. Software zoning is more secure than hardware zoning.
D. When using zones and VSANs together, the zone is created first.
E. Zoning requires that VSANs be established before it becomes operational.


您可能感興趣的試卷

你可能感興趣的試題

1.多項(xiàng)選擇題Which two characteristics are true of IVRs? ()

A. They are known as fabric routing.
B. They cannot span multiple switches.
C. Their connectivity is supported by Layer 2.
D. They enable devices in different VSAN fabrics to communicate.
E. They require that multiple switch fabrics be merged before they can function.

2.多項(xiàng)選擇題Which two statements about FCIP and iSCSI are correct?()

A. The FCIP stack supports file-level storage for remote devices.
B. Both require high throughput with low latency and low jitter.
C. The purpose of FCIP is to provide connectivity between host and storage.
D. TheiSCSI stack supports block-level storage for remote devices.
E. The purpose ofiSCSI is to provide connectivity between separate wide-area SANs.

3.多項(xiàng)選擇題In a collapsed core design, which two benefits are provided by a second-generation Cisco MDS director()

A. a higher fan-out ratio
B. fully redundant switches
C. 100 percent port efficiency
D.allI S Lscontained with inasingle chass is
E.higher latency and through put than acore-edged esign switch

4.單項(xiàng)選擇題Which path selection protocol is used by Fibre Channel fabrics?()

A.IVR
B.VoQ
C.FSPF
D.VSANs
E.SANTap

6.單項(xiàng)選擇題Which statement about Fibre Channel communications is correct?()

A. It operates much like TCP.
B. Flow control is only provided by QoS.
C. It must be implemented in an arbitrated loop.
D. Communication methods are similar to those of an Ethernet bus.
E. N_Port to N_Port connections use logical node connection points.

7.多項(xiàng)選擇題Which two of these correctly describe Fibre Channel? ()

A. supports multiple protocols
B. works only in a shared or loop environment
C. allows addressing for up to 4 million nodes
D. allows addressing for up to 8 million nodes
E. provides a high speed transport for SCSI payloads
F. may stretch to a distance of up to100 km before needing extenders

8.多項(xiàng)選擇題Which two statements about Network Attached Storage are correct?()

A. Data is accessed using NFS or CIFS.
B. Data is accessed at the block level.
C. NAS is referred to as captive storage.
D. Storage devices can be shared between users.
E. A NAS implementation is not as fast as a DAS implementation.

9.多項(xiàng)選擇題You create a server control that inherits from WebControl. You need to enable the server control to emit markup for a new kind of mobile device. You must not alter the code in the server controls. Which two actions should you perform? ()

A. Create a class that inherits HtmlTextWriter and that can emit the new markup.
B. Create a class that inherits StreamWriter and that can emit the new markup.
C. Reference the class in the <capabilities> element of the new device's browser definition file.
D. Reference the class in the <controlAdapters> element of the new device's browser definition file.

10.單項(xiàng)選擇題Which statement about data center access layer design modes is correct?()

A. The access layer is the first oversubscription point in a data center design.
B. When using a Layer 2 loop-free design, VLANs are extended into the aggregation layer.
C. When using a Layer 2 looped design, VLANs are not extended into the aggregation layer.
D. When using a Layer 3 design,stateful services requiring Layer 2 connectivity are provisioned from the aggregation layer.
E. The data center access layer provides the physical-level connections to the server resources and only operates at Layer 3.


最新試題

An organization hires a contractor who only needs access to email and a group calendar. They do not need administrator access to the computer. Which VPN model is the most appropriate?()

題型:?jiǎn)雾?xiàng)選擇題

You are the Cisco Network Designer. Which of these is least important when determining how many users a NAS can support?()

題型:?jiǎn)雾?xiàng)選擇題

What is the recommended radius of a cell for a voice-ready wireless network?()

題型:?jiǎn)雾?xiàng)選擇題

You are the Cisco Network Designer . Which is not major scaling, sizing, and performance consideration for an IPsec design?()

題型:?jiǎn)雾?xiàng)選擇題

Which technology allows centralized storage services to be shared across different VSANs?()

題型:?jiǎn)雾?xiàng)選擇題

You are the network consultant from pass4sure.com. One of your customer has six sites, three of which process a large amount of traffic among them. He plans to grow the number of sites in the future. Which is the most appropriate design topology?()

題型:?jiǎn)雾?xiàng)選擇題

One of your customers has deployed a Layer 3 gateway in the untrusted network. Which gateway mode is appropriate for this customer?()

題型:?jiǎn)雾?xiàng)選擇題

How many channels are defined in the IEEE 802.11b DSSS channel set?()

題型:?jiǎn)雾?xiàng)選擇題

Which of these is a benefit of using Network Admission Control instead of Cisco Identity Based Networking Services?()

題型:?jiǎn)雾?xiàng)選擇題

What will an Easy VPN hardware client require in order to insert its protected network address when it connects using network extension mode?()

題型:?jiǎn)雾?xiàng)選擇題