题目内容

Which two statements about end-host mode in SAN connectivity in a Cisco UCS environment are true? ()

A. End-host mode is synonymous with NPV mode.
B. In end-host mode, only hard pinning of vHBAs to Fibre Channel uplink ports is allowed.
C. Making configuration changes between Fibre Channel switching mode and end-host mode isnondisruptive.
D. End-host mode is the default Fibre Channel switching mode.

查看答案
更多问题

Which are valid statements about Cisco Virtual Interface Card (VIC)? ()

A. The Cisco VIC can create an unlimited number of Virtual NICs
B. The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinks
C. vNICs are created using software on the host operating system
D. The host operating system sees a vNIC as a physical PCIe device
E. The host operating system sees a vNIC as a sub-interface of a primary NIC
F. The Cisco VIC can create 1024 vNICs

RFC 3270 describes Differentiated Services (Diff-Serv) over Multi-Protocol Label Switching (MPLS)networks. Which model alters Differentiated Services (Diff-Serv) code points set in different DifferentiatedServices (Diff-Serv) domain?()

A. Uniform model
B. Pipe Model
C. Short Pipe
D. None of the above will alter Differentiated Services(Diff-Serv)code points set in differentDifferentiatedServices(Diff-Serv)domain

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C. If another router were added to this GLBP group, there would be two backup AVGs
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG

What are three security problems with Wi-Fi Protected Access (WPA)?()

A. WPA is based on the outdated IEEE 802.11i standard.
B. WPA uses RSN,which uses the same base encryption algorithm as RC4.
C. WPA requires a hardware upgrade that may not be supported by all vendors.
D. WPA uses TKIP,which uses the same base encryption algorithm as WE
E. WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F. WPA is susceptible to a security weakness when preshared keys are used.

答案查题题库