-
Which two of these are characteristics of Metro Ethernet?()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which two of these are characteristics of the 802.1Q protocol?()
A . it is a layer 2 messaging protocol which maintains vlan configurations across network.
B . it includes an 8-bit field which specifies the priority of a frame.
C . it is used exclusively for tagging vlan frames and dose not address network reconvergence following switched network topology changes.
D . it modifies the 802.3 frame header,and thus requires that the FCS be recomputed.
E . it is a trunking protocol capable of carring untagged frames.
-
Which two statements are characteristics of pin groups?()
A . they are used internally within fcoe to map a vsan to a specifc vlan
B . they pin traffic fro a specific compute node mezzanine card to aspecific up link port
C . an iplink port for the adapter is chosen automatically if no pin group is set
-
Which two are characteristics of RSVP? ()
A . RSVP itself provides bandwidth and delay guarantees.
B . For RSVP to be end-to-end, all devices must support RSVP.
C . RSVP reservations are maintained by a centralized reservations server.
D . An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations.
-
Which two of these are characteristics of MPLS VPNs? ()
A . Layer 3 MPLS VPNs can forward only IP packets
B . Layer 2 MPLS VPNs can forward any network protocol
C . MPL S label paths are automatically formed based on Layer 2 frames
D . Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E . In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policie
-
Which two are characteristics of the Intercepting Filter pattern?()
A . it provides centralized request handling for incoming requests.
B . It forces resource authentication to be distributed across web components.
C . It reduces coupling between presentation-tier clients and underlying business services.
D . It can be added and removed unobtrusively, without requiring changes to existing code.
E . It allows preprocessing and postprocessing on the incoming requests and outgoing responses.
-
Which two statements are characteristics of a distance vector routing protocol?()
A . RIP is an example of distance vector routing protocols.
B . Updates are periodic and include the entire routing table.
C . Routing updates are sent only after topology changes
D . The protocol can be useful in hub-and-spoke and hierarchical networks.
E . Convergence is usually faster than with link state protocols
F . Each router has its own view of the topology
-
Which two of these are characteristics of an IDS sensor?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IDS interface and exits on another
E . has a promiscuous interface that is used to monitor the network
-
Which two statements are characteristics of a distance vector routing protocol?()
A . RIP is an example of distance vector routing protocols.
B . Updates are periodic and include the entire routing table.
C . Routing updates are sent only after topology changes
D . The protocol can be useful in hub-and-spoke and hierarchical networks.
E . Convergence is usually faster than with link state protocols
F . Each router has its own view of the topology
-
Which two are characteristics of the Transfer Object design pattern?()
A . It reduces network traffic by collapsing multiple remote requests into one.
B . It increases the complexity of the remote interface by removing coarse-grained methods.
C . It increases the complexity of the design due to remote synchronization and version control issues.
D . It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.
-
Which two characteristics are true of IVRs? ()
A . They are known as fabric routing.
B . They cannot span multiple switches.
C . Their connectivity is supported by Layer 2.
D . They enable devices in different VSAN fabrics to communicate.
E . They require that multiple switch fabrics be merged before they can function.
-
Which two characteristics are common between traffic policing and traffic shaping?()
A . The rate of traffic is measured and compared to a configured policy.
B . Classification is used to differentiate traffic.
C . Traffic is marked and sent out according to priority.
D . Both can be applied to inbound and outbound traffic.
E . Both buffer traffic to ensure a predetermined traffic rate.
F . Both drop traffic that is above a predetermined traffic rate.
-
Which two of these are characteristics of Metro Ethernet? ()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which two are characteristics of RSVP?()
A . RSVP itself provides bandwidth and delay guarantees.
B . For RSVP to be end-to-end, all devices must support RSVP.
C . RSVP reservations are maintained by a centralized reservations server.
D . An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations.
-
Which two are characteristics of the Front Controller pattern?()
A . It simplifies remote interfaces to distributed objects.
B . It promotes cleaner application partitioning and encourages reuse.
C . It provides an initial point of contact for handling all related requests.
D . It reduces maintainability due to the increased complexity of the design.
E . It provides loosely coupled handlers that can be combined in various permutations.
-
Which two of the following are valid characteristics of EIGRP?()
A . Has a maximum hop count of 25
B . Can differentiate between internal and external routes
C . Uses a 32-bit metric
D . Can maintain only one routing table
E . Need all networks to use the same subnet mask
F . Supports only one routed protocol
-
Which two characteristics are most typical of a SAN? ()
A . NICs are used for network connectivity.
B . Servers request specific blocks of data.
C . Storage devices are directly connected to servers.
D . A fabric is used as the hardware for connecting servers to storage devices.
E . The TCO is higher because of the cost of director class storage switches.
-
Which two are characteristics of the cost-containment business challenge?()
A . reducing security breaches
B . using the Internet more
C . reducing upgrade charges
D . adopting new applications and service
-
Which two of these are characteristics of an IPS device?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IPS interface and exits on another
-
Which two are NOT characteristics of the OSPF routing protocol?()
A . It confines network instability to a single area of network.
B . It increases the routing overhead of the network
C . It supports VLSM
D . It routes between Autonomous Systems.
E . It allows extensive control of routing update
-
Which two of these are characteristics of multicast routing? ()
A . multicast routing uses RPF
B . multicast routing is connectionless.
C . In multicast routing, the source of a packet is known.
D . When network topologies change, multicast distribution trees are not rebuilt, but use the originalpath
E . Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destinatio
-
Which two of these are characteristics of an IPS device?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IPS interface and exits on another
-
Which two characteristics are most typical of a SAN? ()
A . NICs are used for network connectivity.
B . Servers request specific blocks of data.
C . Storage devices are directly connected to servers.
D . A fabric is used as the hardware for connecting servers to storage devices.
E . The TCO is higher because of the cost of director class storage switches.
-
Which two are characteristics of the Service Locator pattern?()
A . It encapsulates component lookup procedures.
B . It increases source code duplication and decreases reuse.
C . It improves client performance by caching context and factory objects.
D . It degrades network performance due to increased access to distributed lookup services.
-
Which two are characteristics of an IPv6 multicast address?()
A . First (most significant ) octet is FF in hex
B . Starts with a prefix of FE80 to FEBF in hex
C . Starts with a prefix of FECO to FEFF in hex
D . Second octet contains a 4-bit multicast scope field
E . Last 64 bit contains the modified MAC address of the Ethernet interface
F . Is allocated from the unicast address space