-
Identify two correct statements to complete the sentance. In a Coherence implementation, it is a best practice to implement PortableObject on all customer objects because:()
A . it leverages Java’s built-in serialization
B . it provides a more efficient serialization of the object
C . it allows the object to be shared across applications
D . it allows the object to be shared across programming platform
-
When implementing OSPFv3, which statement describes the configuration of OSPF areas?()
A . In interface configuration mode, the OSPFv3 area ID combination assigns interfaces to OSPFv3 areas.
B . In router configuration mode, the network wildcard area ID combination assigns networks to OSPFv3 areas.
C . In interface configuration mode, the IPv6 OSPF process area ID combination assigns interfaces to OSPFv3 areas.
D . In router configuration mode, the IPv6 OSPF interface area ID combination assigns interfaces to OSPFv3 areas.
-
Which two design concerns must be addressed when designing a multicast implementation?()
A . only the low-order 23 bits of the MAC address are used to map IP addresses
B . only the low-order 24 bits of the MAC address are used to map IP addresses
C . only the high-order 23 bits of the MAC address are used to map IP addresses
D . only the low-order 23 bits of the IP address are used to map MAC addresses
E . the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F . the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresse
-
Which three best practices should be implemented at the campus backbone submodule to support the server farm module?()
A . Implement highly redundant switching and links with no single points or paths of failure.
B . Implement server load balancing.
C . Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D . Implement intrusion detection with automatic notification of intrusion attempts in place.
-
Which two statements about route redistribution when implementing OSPF are true?()
A . Routes learned using any IP routing protocol can only be redistributed into non IP routing protocols.
B . OSPF can import routes learned using EIGRP, RIP, and IS - IS.
C . OSPF routes cannot be exported into EIGRP, RIP, an d IS - IS.
D . At the interdomain level, OSPF cannot import routes learned using BGP.
E . OSPF routes can be exported into BGP.
-
AutoQoS takes the interface type and bandwidth into consideration when implementing what three QoS features?()
A . FECN
B . LLQ
C . WRED
D . LFI
E . CRTP
F . CBWFQ
-
When an MPLS Layer 2 VPN runs in the hub-and-spoke model, where is QoS implemented?()
A . hub and spoke
B . PE
C . CE
D . hub
E . spoke
-
What network information do you need when you plan to implement a VLAN-based solution?()
A . default VLAN information for all unused switch ports
B . 802.1x configuration parameters
C . number of IP subnets needed
D . IP routing protocol informatio
-
Which interface must a session attribute implement if it needs to be notified when a web container persistsa session?()
A . javax.servlet.http.HttpSessionListener
B . javax.servlet.http.HttpSessionBindingListener
C . javax.servlet.http.HttpSessionAttributeListener
D . javax.servlet.http.HttpSessionActivationListener
-
When implementing 802.1X on Teleworker routers and using separate DHCP address pools for Teleworker and Home-user devices, traffic between devices can be restricted. How can you best accomplish this?()
A . Access Lists between the inside interface and loopback interface
B . Context Based Access Control
C . Dynamic Host Configuration Protocol
D . Network Address translatio
-
What is a critical piece of information that you should have when creating a VLAN-based implementation plan?()
A . approval from senior management
B . end-user requirements
C . IEEE 802.1X authentication parameters
D . a summary implementation pla
-
When should traffic shaping be implemented on Frame Relay PVCs?()
A . When you want to drop excess traffic above the CIR
B . When there is a speed mismatch between the central site and the remote site
C . When using Frame Relay SVCs
D . When over-subscribing the central site link
E . When LLQ is implemented on the Frame Relay PVC
F . When Multilink PPP LFI is implemented on the Frame Relay PVC
-
What are two important guidelines to follow when implementing VTP?()
A . CDPmust be enabled on all switches in theVTP management domain.
B . All switches in the VTPdomain must run the same version of VTP.
C . When using secure mode VTP, only configure management domain passwords onVTP servers.
D . EnablingVTP pruning on a server willenable the feature for the entire management domain.
E . Use of theVTPmulti-domain feature should be restricted to migration and temporary implementation.
-
Which definition best describes the staff training service component within the implement phase? Select exactly 1 answer(s) from the following:()。
A . improving the network management system and the performance and functionality of infrastructure operations
B . providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer network
C . developing and implementing a training plan using classes, workshops, or c-learning courses
D . compiling a training manual for use in ongoing operations
E . reducing the risk of downtime due to facilities-related problem
-
What is the recommended practice regarding UDLD when implementing it in all fiber-optic LANports?()
A . Adjust the default hello timers to three seconds for aggressive mode
B . Enable it in global mode and on every interface you need to support
C . Enable it in global mode to support every individual fiber-optic interface
D . Enable it to create channels containing up to eight parallel links between switche
-
You are implementing basic switch security best practices. Which of these is a tactic that you can use to mitigate compromises from being launched through the switch?()
A . Make all ports private VLAN ports.
B . Place all unused ports in native VLAN 1 until needed.
C . Proactively configure unused switch ports as access ports.
D . Disable Cisco Discovery Protocol globally.
-
What statement is true regarding processor allocation when implementing micro-partitions? ()
A . The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.1 core.
B . The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.01 core.
C . The minimum configurable capacity allocation is 1.0 core and the minimum increment is 0.01 core.
D . The minimum configurable capacity allocation is 0.1 core and the minimum increment is 0.001
-
What type of protection is implemented when the DBA issues the ALTER DATABASE SET STANDBY DATABASE PROTECTED; command?()
A . The standby database is protected against write operations.
B . The primary database is protected against write operations.
C . The primary database is protected against data loss and data divergence.
D . The standby database is protected against data loss and data divergence.&e
-
Which definition best describes the implementation service component within the implement phase? Select exactly 1 answer(s) from the following:()。
A . providing a step-by-step plan that details the installation and service-commission tasks required in order to create a controlled-implementation environment that emulates a customer network
B . assessing the ability of site facilities to accommodate proposed infrastructure changes
C . developing and executing proof-of-concept tests, validating high-level infrastructure design, and identifying any design enhancements
D . installing, configuring, and integrating systems components based on an implementation plan developed in earlier phases
E . improving a customer’s infrastructure security system
-
Which three best practices should be implemented at the campus backbone submodule to supportthe server farm module? ()
A . Implement highly redundant switching and links with no single points or paths of failure.
B . Implement server load balancing.
C . Implement the Hot Standby Router Protocol (HSRP) for failover protection.
D . Implement intrusion detection with automatic notification of intrusion attempts in place.
-
Which two design concerns must be addressed when designing a multicast implementation?()
A . only the low-order 23 bits of the MAC address are used to map IP addresses
B . only the low-order 24 bits of the MAC address are used to map IP addresses
C . only the high-order 23 bits of the MAC address are used to map IP addresses
D . only the low-order 23 bits of the IP address are used to map MAC addresses
E . the 0x01004f MAC address prefix is used for mapping IP addresses to MAC addresses
F . the 0x01005e MAC address prefix is used for mapping IP addresses to MAC addresse
-
Which two are needed components when designing and implementing a security solution?()
A . detailed VLAN information
B . an incident response plan
C . results of testing the new network configuration
D . an existing hierarchical network topology
E . a security policy for your organizatio
-
When is the best time to establish your credibility?
-
You are the administrator of a Junos Pulse Access Control Service implementation. You must restrict authenticated users connected from the branch offices to a few specific resources within the data center. However, when the authenticated users are connected at the corporate office, they are allowed more access to the data center resources.You have created two roles with different levels of access and are trying to determine the best way of controlling when a user is mapped to a specific role. Having the user prompted to manually select their role is possible, but you want to automate the process.Which configuration solves this problem?()
A. Implement a RADIUS request attribute policy to assist with realm selection and create different role-mapping rules for the user in each realm.
B. Implement a directory/attribute server on the realm and set up this server to determine by group membership the proper role to which a user should be mapped.
C. Reorder the role-mapping rules to allow for the more open role to be mapped first and then enable the "stop processing rules when this rule matches" function on this role.
D. Implement a Host Checker policy on the realm that determines the geographic location of the device and restricts the user based on the results of the policy.