题目内容

Which are valid statements about Cisco Virtual Interface Card (VIC)? ()

A. The Cisco VIC can create an unlimited number of Virtual NICs
B. The number of vNICs on the Cisco VIC that can be created is determined by the number of chassis uplinks
C. vNICs are created using software on the host operating system
D. The host operating system sees a vNIC as a physical PCIe device
E. The host operating system sees a vNIC as a sub-interface of a primary NIC
F. The Cisco VIC can create 1024 vNICs

查看答案
更多问题

RFC 3270 describes Differentiated Services (Diff-Serv) over Multi-Protocol Label Switching (MPLS)networks. Which model alters Differentiated Services (Diff-Serv) code points set in different DifferentiatedServices (Diff-Serv) domain?()

A. Uniform model
B. Pipe Model
C. Short Pipe
D. None of the above will alter Differentiated Services(Diff-Serv)code points set in differentDifferentiatedServices(Diff-Serv)domain

Refer to the exhibit. Which three statements accurately describe this GLBP topology? (Choose three.)()

A. Router A is responsible for answering ARP requests sent to the virtual IP address.
B. If Router A becomes unavailable, Router B will forward packets sent to the virtual MAC address of Router A
C. If another router were added to this GLBP group, there would be two backup AVGs
D. Router B is in GLBP listen state.
E. Router A alternately responds to ARP requests with different virtual MAC addresses.
F. Router B will transition from blocking state to forwarding state when it becomes the AVG

What are three security problems with Wi-Fi Protected Access (WPA)?()

A. WPA is based on the outdated IEEE 802.11i standard.
B. WPA uses RSN,which uses the same base encryption algorithm as RC4.
C. WPA requires a hardware upgrade that may not be supported by all vendors.
D. WPA uses TKIP,which uses the same base encryption algorithm as WE
E. WPA is susceptible to a DoS attack when it receives two packets in quick succession with bad MICs,forcing the AP to shut down the entire Basic Service Set (BSS) for one minute.
F. WPA is susceptible to a security weakness when preshared keys are used.

Which statement is true about "full state backup" in a Cisco Unified Computing System?()

An XML file containing all details of the system, including IP address and cluster details
B. A binary file containing only service profiles, pools, and other items configured after initial configuration
C. A binary file containing all details of the system, including IP address and cluster details
D. An XML file containing only service profiles, pools, and other items configured after initial configuration
E. A text file with the NX-OS running configuration

答案查题题库