-
You are designing the Active Directory site topology to meet the business and technical requirements. Which site or sites will require universal group membership caching?()
A . New York
B . Montreal
C . Quebec
D . San Francisco
E . Seattle
F . Vancouver
-
Which directory contains RSCT topology services logs?()
A . /var/ha/log
B . /var/ha/rsct
C . /var/hacmp/log
D . /var/hacmp/rsct
-
Which command verifies both the cluster topology and resource configuration?()
A . cldare -r
B . clsync -rt
C . clverify -r
D . clverify -t
-
Which one of the following answer choices below is true regarding the OSPF topology database?()
A . All entries in the topology database will be included on each router.
B . All routers in the same OSPF area will have one topology database.
C . The Dijkstra algorithm is used in the creation of the topology database.
D . LSA packets are used to update and maintain the topology database.
-
You are designing a site topology to meet the business and technical requirements. What should you do?()
A . Increase the replication interval between sites.
B . Use SMTP as the transport protocol for replication.
C . Create site links to represent the physical topology.
D . Disable the Knowledge Consistency Checker (KCC) and manually configure site replication.
-
You are designing the DNS topology to meet the business and technical requirements. Which DNS structure should you use?()
A . one primary zone
B . two primary zones
C . one Active Directory-integrated zone that has the replication scope set to all DNS servers in the forest.
D . two Active Directory-integrated zones that have the replication scopes set to all DNS servers in the forest.
E . one Active Directory-integrated zone that has the replication scope set to all domain controllers in the domain.
F . two Active Directory-integrated zones that have the replication scopes set to all domain controllers in the domain.
-
Which of the following topology situations would be a qood candidate for configuring DMVPN()
A . Extranet VPN
B . Managed overlay VPN topology
C . Hub-and-spoke VPN topology
D . Central-site VPN topology
E . Full mesh VPN topology
F . Remote-access VPN topology
-
You are designing a site topology for the new Active Directory environment. What should you do? ()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
You are designing the Active Directory site topology to meet the business and technical requirements. Which site or sites will require universal group membership caching?()
A . New York
B . Montreal
C . Quebec
D . San Francisco
E . Seattle
F . Vancouver
-
Which of these statements is true of routing protocols in a hub-and-spoke IPsec VPN topology?()
A . EIGRP can summarize per interface.
B . OSPF router databases remain independent.
C . When they are configured with stubs, EIGRP regularly floods the topology.
D . OSPF topology decisions are made independent of hierarchy or area.
-
Which of the following are methods EIGRP uses to initially populate (seed) its EIGRP topology table, before learning topology data from neighbors?()
A . By adding all subnets listed by the show ip route connected command
B . By adding the subnets of working interfaces over which static neighbors have been defined
C . By adding subnets redistributed on the local router from another routing source
D . By adding all subnets listed by the show ip route static command
-
Which design topology incurs a performance penalty since there are two encryption-decryption cycles between any two remote sites?()
A . peer-to-peer
B . hub and spoke
C . partial mesh
D . full mesh
-
You are designing the site topology for the internal domain. Which action or actions should you perform?()
A . Create a Single Site.
B . Create a site for each physical location.
C . Set the replication interval on the default IP site link to 60 Minutes.
D . Configure the schedule of the default IP site link to only allow replication between the hours of 9:00 PM and 5:00 AM.
E . Configure the schedule of the default IP site link to only allow replication between the hours of 3:00 AM and 11:00 AM.
-
Refer to the topology shown in the exhibit. Which ports will be STP designated ports if all the links are operating at the same bandwidth? ()https://assets.asklib.com/images/image2/201807231709263903.jpg
A . Switch A - Fa0/0
B . Switch A - Fa0/1
C . Switch B - Fa0/0
D . Switch B - Fa0/1
E . Switch C - Fa0/0
F . Switch C - Fa0/1
-
Which two statements about a wireless repeater topology are true?()
A . A wireless repeater is an access point that is not connected to the wired LAN.
B . The repeater feature is only available in lightweight access point topologies.
C . The SSID of the root access point must be configured on the repeater access point.
D . This topology requires a 10 - 15 percent overlap between a wired access point and the wireless repeater.
E . This topology requires a 15 - 25 percent overlap between a wired access point and the wireless repeater.
F . To avoid interference, the repeater access point must use a different channel from what the root access point uses.
-
You need to determine the correct wireless LAN topology for use in the Company network. Which three statements are true about the various WLAN topologies?()
A . In ad hoc mode, the Independent Basic Service Set (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
B . In Infrastructure mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single access point for connecting to each other or to wired network resources.
C . In Infrastructure mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS).
D . In Infrastructure mode, the Independent Basic Service Setet (IBSS) is a framework in which mobile clients connect directly without an intermediate access point.
E . In ad hoc mode, the Basic Service Set (BSS) is a framework in which mobile clients use a single AP for connecting to each other or to wired network resources.
F . In ad hoc mode, the Extended Services Set (ESS) is a framework in which two or more Basic Service Sets are connected by a common distribution system (DS)
-
One of your customer has six sites, three of which process a large amount of traffic among them.He plans to grow the number of sites in the future. Which is the most appropriate design topology?()
A . full mesh
B . peer-to-peer
C . partial mesh
D . hub and spoke
-
A host is to become part of a hierarchical naming topology. Which of the following services are required?()
A . DHCP
B . Domain Name Service
C . Network Information Service
D . A hosts file
-
Which two RSTP port roles include the port as part of the active topology?()
A . root
B . designated
C . alternate
D . backup
E . forwarding
F . learning
-
Which of the following will generate an RSTP topology change notification?()
A . an edge port that transitions to the forwarding state
B . a non-edge port that transitions to the blocking state
C . a non-edge port that transitions to the forwarding state
D . an edge port that transitions to the blocking state
E . any port that transitions to the blocking state
F . any port that transitions to the forwarding state
-
You are designing a site topology for the new Active Directory environment. What should you do?()
A . Create one site for all offices. Place the subnets for the four branch offices and the Sydney main office in this site.
B . Create two sites: one site for the four branch offices and one site for the Sydney main office. Place the subnets for the branch offices in one site. Place the subnet for the Sydney main office in the other site.
C . Create three sites: one site for the four branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
D . Create four sites: one for the Melbourne and Perth branch offices, one site for the Berlin and Paris branch offices, one site for the Sydney main office, and one site for the Sydney satellite offices.
E . Create five sites; one site for the Melbourne branch office, one site for the Perth branch office, one site for the Berlin branch office, one site for the Paris branch office, and one site for the Sydney main office. Place the subnets for each branch office and the Sydney main office in their respective sites.
-
You are designing the DNS topology to meet the business and technical requirements. Which DNS structure should you use?()
A . one primary zone
B . two primary zones
C . one Active Directory-integrated zone that has the replication scope set to all DNS servers in the forest.
D . two Active Directory-integrated zones that have the replication scopes set to all DNS servers in the forest.
E . one Active Directory-integrated zone that has the replication scope set to all domain controllers in the domain.
F . two Active Directory-integrated zones that have the replication scopes set to all domain controllers in the domain.
-
Which show command will display only the Type 5 LSAs in the OSPF topology database?()
A . show ip ospf database external
B . show ip ospf database nssa - external
C . show ip route ospf
D . show ip ospf datab ase summary
E . show ip route
-
It is considered a best practice to use the Dead Peer Detection (DPD) feature with which VPN topologies?()
A . IPSec
B . IPSec with GRE
C . DMVPN
D . EZVPN
E . all of the choice