When designing a PC, which of the following components would help a large application load theFASTEST?()
When designing a converged network, which measures can be taken at the building access layer to help eliminate latency and ensure end-to-end quality of service can be maintained? ()A. rate limit voice trafficB. configure spanning-tree for fast link convergenceC. isolate voice traffic on separate VLANsD. classify and mark traffic close to the source
点击查看答案
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A.RFPB.RFCC.SLC/SLAD.SOW
When creating a network security solution, which two pieces of information should you have previously obtained to assist in designing the solution? ()A、a list of existing network applications currently in use on the networkB、network audit results to uncover any potential security holesC、a planned Layer 2 design solutionD、a proof-of-concept planE、device configuration templates
Which three of these pre-requisite for resetting a Catalyst Express 500 switch when Cisco Network Assistant is unavailable?()A、At Least one enabled switch port that is unconnected to any deviceB、A PC pre-configured with a specific IP Address and MaskC、A PC or laptop with Windows 2000 or Windows XP installed and a web browser that has Java Script enabledD、Physical Access to SwitchE、A Switch with no connected devices
When designing the WAN module within the enterprise edge, which document is used to specify the connectivity and performance agreements with the service provider?()A、RFPB、RFCC、SLC/SLAD、SOW
When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()A、 rate limit voice trafficB、 configure spanning-tree for fast link convergenceC、 isolate voice traffic on separate VLANsD、 classify and mark traffic close to the source
Which two are needed components when designing and implementing a security solution?()A、detailed VLAN informationB、an incident response planC、results of testing the new network configurationD、an existing hierarchical network topologyE、a security policy for your organization