更多“多选题What are two valid Cluster load balancing methods? ()(Choose two.)AurlhashBbackup chainingCleast connectionsDfewest outstanding requests”相关问题
  • 第1题:

    Which two queuing methods are supported by outbound QoS?() (Choose two.)

    • A、weighted fair priority
    • B、weighted fair queuing
    • C、weighted strict priority
    • D、weighted strict queuing

    正确答案:B,C

  • 第2题:

    What are two functions that the parameter max-session performs? ()(Choose two.)

    • A、Defines the session limit for the domain.
    • B、Defines the session limit for the tunnel instance.
    • C、Used to control load balancing between multiple domains.
    • D、Used to control load balancing between multiple tunnels for a domain.

    正确答案:B,D

  • 第3题:

    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()

    • A、Log on to one of the cluster nodes and run the wlbs disable all command.
    • B、Open the Network Load Balancing Clusters console and delete the default port rules.
    • C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
    • D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

    正确答案:B,C

  • 第4题:

    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()

    • A、Log on to one of the cluster nodes and run the wlbs disable all command.
    • B、Open the Network Load Balancing Clusters console and delete the default port rules.
    • C、Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.
    • D、Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.

    正确答案:B,C

  • 第5题:

    多选题
    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster is intended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com.  You discover that Contoso users can see the Network Load Balancing cluster in the network neighborhood and can connect to various services by using the web.contoso.com name. The web.contoso.com Network Load Balancing cluster is configured with only one port rule.  You need to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
    A

    Log on to one of the cluster nodes and run the wlbs disable all command.

    B

    Open the Network Load Balancing Clusters console and delete the default port rules.

    C

    Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.

    D

    Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.


    正确答案: C,A
    解析: 暂无解析

  • 第6题:

    多选题
    What are three Juniper DX Cluster benefits?() (Choose three.)
    A

    performance

    B

    authorization

    C

    compression

    D

    protocol validation

    E

    UDP load balancing


    正确答案: C,A
    解析: 暂无解析

  • 第7题:

    多选题
    What are two types of WebView monitoring statistics on the WX/WXC platforms?() (Choose two.)
    A

    LAN

    B

    QoS

    C

    traffic

    D

    IPSec


    正确答案: D,B
    解析: 暂无解析

  • 第8题:

    多选题
    What are two characteristics of Telnet (Choose two.)()。
    A

    Itsendsdataincleartextformat.

    B

    ItisnolongersupportedonCisconetworkdevices.

    C

    ItismoresecurethanSSH

    D

    Itrequiresanenterpriselicenseinordertobeimplemented.

    E

    ItrequiresthatthedestinationdevicebeconfiguredtosupportTelnetconnections.


    正确答案: B,C
    解析: 暂无解析

  • 第9题:

    多选题
    What are two functions that the parameter max-session performs? ()(Choose two.)
    A

    Defines the session limit for the domain.

    B

    Defines the session limit for the tunnel instance.

    C

    Used to control load balancing between multiple domains.

    D

    Used to control load balancing between multiple tunnels for a domain.


    正确答案: C,A
    解析: 暂无解析

  • 第10题:

    多选题
    Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()
    A

    Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console

    B

    Run the wlbs disable command on the cluster nodes

    C

    Assign a unique port rule for NLB cluster by using the NLB Cluster console

    D

    Delete the default port rules through Network Load Balancing Cluster console


    正确答案: A,B
    解析: 暂无解析

  • 第11题:

    多选题
    Which two secure remote access methods are available on the WX platforms?() (Choose two.)
    A

    SSL

    B

    SSH

    C

    Telnet

    D

    HTTP


    正确答案: C,D
    解析: 暂无解析

  • 第12题:

    多选题
    What are two outcomes of deploying virtual SANs? ()(Choose two.)
    A

    increased administration

    B

    improved availability

    C

    reduced backup

    D

    increased security

    E

    greater storage demand


    正确答案: E,A
    解析: 暂无解析

  • 第13题:

    Which two secure remote access methods are available on the WX platforms?() (Choose two.)

    • A、SSL
    • B、SSH
    • C、Telnet
    • D、HTTP

    正确答案:A,B

  • 第14题:

    You are the network administrator for your company. The network consists of a single Active Directory domain. All computers on the network are members of the domain.   You administer a Network Load Balancing cluster that consists of three nodes. Each node runs Windows Server 2003 and contains a single network adapter. The Network Load Balancing cluster can run only in unicast mode. The Network Load Balancing cluster has converged successfully.   To increase the utilization of the cluster, you decide to move a particular application to each node of the cluster. For this application to run, you must add a Network Load Balancing port rule to the nodes of the cluster.   You start Network Load Balancing Manager on the second node of the cluster. However, Network Load Balancing Manager displays a message that it cannot communicate with the other two nodes of the cluster.  You want to add the port rule to the nodes of the cluster.   What should you do?  ()

    • A、 Use Network Load Balancing Manager on the Network Load Balancing default host to add the port rule.
    • B、 Change the host priority of the second node to be the highest in the cluster, and then use Network Load Balancing Manager to add the port rule.
    • C、 Run the nlb.exe drain command on each node, and then use Network Load Balancing Manager to add the port rule.
    • D、 Add the port rule through Network Connections Properties on each node.

    正确答案:D

  • 第15题:

    You need to design the Exchange 2003 server configuration for remote e-mail access. What should you do?()

    • A、Configure the front-end servers in each branch office to be members of a new Active Directory site
    • B、Configure the back-end servers to have server encryption certificates issued by a commercial certification authority (CA)
    • C、Configure two back-end servers to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound RPC connections
    • D、Configure multiple front-end servers in each branch office to be members of a Network Load Balancing cluster. Configure Network Load Balancing for inbound HTTPS connections

    正确答案:D

  • 第16题:

    Certkiller .com boosts a two-node Network Load Balancing cluster which is called web. CK1 .com. The purpose of this cluster is to provide load balancing and high availability of the intranet website only. With monitoring the cluster, you discover that the users can view the Network Load Balancing cluster in their Network Neighborhood and they can use it to connect to various services by using the name web. CK1 .com.  You also discover that there is only one port rule configured for Network Load Balancing cluster.  You have to configure web. CK1 .com NLB cluster to accept HTTP traffic only.  Which two actions should you perform to achieve this objective()

    • A、Create a new rule for TCP port 80 by using the Network Load Balancing Cluster console
    • B、Run the wlbs disable command on the cluster nodes
    • C、Assign a unique port rule for NLB cluster by using the NLB Cluster console
    • D、Delete the default port rules through Network Load Balancing Cluster console

    正确答案:A,D

  • 第17题:

    多选题
    Regarding content filtering, what are two pattern lists that can be configured in the Junos OS? ()(Choose two.)
    A

    protocol list

    B

    MIME

    C

    block list

    D

    extension


    正确答案: A,D
    解析: 暂无解析

  • 第18题:

    多选题
    What are two valid Cluster load balancing methods? ()(Choose two.)
    A

    urlhash

    B

    backup chaining

    C

    least connections

    D

    fewest outstanding requests


    正确答案: A,D
    解析: 暂无解析

  • 第19题:

    多选题
    Which two methods are used to assign an IP address to a WX device? ()(Choose two.)
    A

    SSH

    B

    Telnet

    C

    WebView

    D

    device front panel

    E

    serial console (command-line interface)


    正确答案: B,C
    解析: 暂无解析

  • 第20题:

    多选题
    What are two valid initial configuration methods supported on Juniper routers?()
    A

    CLI

    B

    J-Web

    C

    JUNOScope

    D

    PCMCIA flash card


    正确答案: A,B
    解析: 暂无解析

  • 第21题:

    多选题
    What are two security appliances that can be installed in a network (Choose two.)()。
    A

    ATM

    B

    IDS

    C

    IOS

    D

    IOX

    E

    IPS

    F

    SDM


    正确答案: B,D
    解析: 暂无解析

  • 第22题:

    多选题
    Your company named Contoso, Ltd. has a two-node Network Load Balancing cluster. The cluster isintended to provide high availability and load balancing for only the intranet Web site. The name of the cluster is web.contoso.com. You discover that Contoso users can see the Network Load Balancingcluster in the network neighborhood and can connect to various services by using the web.contoso.comname. The web.contoso.com Network Load Balancing cluster is configured with only one port rule. Youneed to configure the web.contoso.com Network Load Balancing cluster to accept only HTTP traffic. Which two actions should you perform?()
    A

    Log on to one of the cluster nodes and run the wlbs disable all command.

    B

    Open the Network Load Balancing Clusters console and delete the default port rules.

    C

    Open the Network Load Balancing Clusters console and create a new Allow rule for TCP port 80.

    D

    Open the Network Load Balancing Clusters console and change the default port rule to a disabled port range rule.


    正确答案: A,D
    解析: 暂无解析

  • 第23题:

    多选题
    What are two alternatives to configuring a full mesh of IBGP peers within your AS? ()(Choose two.)
    A

    multihop

    B

    communities

    C

    confederations

    D

    route reflection


    正确答案: B,C
    解析: 暂无解析

  • 第24题:

    多选题
    Which two queuing methods are supported by outbound QoS?() (Choose two.)
    A

    weighted fair priority

    B

    weighted fair queuing

    C

    weighted strict priority

    D

    weighted strict queuing


    正确答案: A,C
    解析: 暂无解析