-
Which two of these are characteristics of Metro Ethernet?()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which of the following are characteristics of OSPF areas?()
A . Hierarchical OSPF networks need to be in one area
B . Multiple OSPF areas must connect to area 0
C . Single area OSPF networks must be configured in area 1
D . Areas can be assigned any number from 0 to 63535
E . Area 0 is called the backbone area
F . Each OSPF area need to be configured with a loopback interface
-
Which three are characteristics of an IPV6 anycast address?()
A . any-to-many communication model
B . delivery of packets to the group interface that is closest to the sending device
C . one-to-many communication model
D . the same address for multiple devices in the group
E . one-to-nearest communication model
F . a unique IPV6 address for each device in the grou
-
Which two statements are characteristics of pin groups?()
A . they are used internally within fcoe to map a vsan to a specifc vlan
B . they pin traffic fro a specific compute node mezzanine card to aspecific up link port
C . an iplink port for the adapter is chosen automatically if no pin group is set
-
Which two are characteristics of RSVP? ()
A . RSVP itself provides bandwidth and delay guarantees.
B . For RSVP to be end-to-end, all devices must support RSVP.
C . RSVP reservations are maintained by a centralized reservations server.
D . An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations.
-
Which three of these are characteristics of UTP cable?()
A . The wires in each pair are wrapped around each other
B . An insulating material covers each of the individual copper wires in it
C . It comes in eight-pair wire bindles
D . EMI and RFI cause only limited degradation to signals running over it
E . It comes in seven categories
F . IT has an external diameter of approximately 0 28 inche
-
Which two of these are characteristics of MPLS VPNs? ()
A . Layer 3 MPLS VPNs can forward only IP packets
B . Layer 2 MPLS VPNs can forward any network protocol
C . MPL S label paths are automatically formed based on Layer 2 frames
D . Layer 3 MPLS VPNs can forward any network protocol based on Layer 2 frames
E . In Layer 2 MPLS VPNS, the service provider controls the customer Layer 3 policie
-
Which of the following are key characteristics of PPP?()
A . can be used over analog circuits
B . maps Layer 2 to Layer 3 address
C . encapsulates several routed protocols
D . supports IP only
E . provides error correctio
-
Which three statements are characteristic of the MEMORY storage engine?()
A . It can support transactions
B . Table contents are not saved if the server is restarted
C . It cannot contain text or BLOB columns
D . It can support foreign keys
E . Each table is represented on disk as an.frm file
F . Each table has a corresponding.MYI and .MYD file
-
Which three statements are typical characteristics of VLAN arrangements?()
A . A new switch has no VLANs configured.
B . Connectivity between VLANs requires a Layer 3 device.
C . VLANs typically decrease the number of collision domains.
D . Each VLAN uses a separate address space.
E . A switch maintains a separate bridging table for each VLAN.
F . VLANs cannot span multiple switches.
-
Which two are characteristics of the Intercepting Filter pattern?()
A . it provides centralized request handling for incoming requests.
B . It forces resource authentication to be distributed across web components.
C . It reduces coupling between presentation-tier clients and underlying business services.
D . It can be added and removed unobtrusively, without requiring changes to existing code.
E . It allows preprocessing and postprocessing on the incoming requests and outgoing responses.
-
Which of the following are shared distribution tree characteristics()
A . Memory requirements are higher for shared distribution tree than for source distributiontree.
B . Creates a tree from a central RP to all last-hoprouters.
C . Uses a rendezvous point.
D . An optimal path is created between each source router and each last-hoprouter.
E . Place(S,G)entry in each router’smulticast routing table.
F . Place(*,G)entry in a router’smulticast routing to table.
-
Which three characteristics are true of the ProtectLink Gateway product?()
A . protects from spyware and phishing attacks
B . provides web server content filtering
C . provides encryption between a browser and a web server
D . is bundled in the SPS platform
E . blocks 97% of SPAM
F . provides content filtering for e-mail
-
Which two of these are characteristics of an IDS sensor?()
A . passively listens to network traffic
B . is an active device in the traffic path
C . has a permissive interface that is used to monitor networks
D . traffic arrives on one IDS interface and exits on another
E . has a promiscuous interface that is used to monitor the network
-
Which two are characteristics of the Transfer Object design pattern?()
A . It reduces network traffic by collapsing multiple remote requests into one.
B . It increases the complexity of the remote interface by removing coarse-grained methods.
C . It increases the complexity of the design due to remote synchronization and version control issues.
D . It increases network performance introducing multiple fine-grained remote requests which return verysmall amounts of data.
-
Which two characteristics are true of IVRs? ()
A . They are known as fabric routing.
B . They cannot span multiple switches.
C . Their connectivity is supported by Layer 2.
D . They enable devices in different VSAN fabrics to communicate.
E . They require that multiple switch fabrics be merged before they can function.
-
Which two of these are characteristics of Metro Ethernet? ()
A . class of service
B . bandwidth profiles
C . user-network interface
D . Ethernet LAN circuit attributes
E . Ethernet virtual circuit attribute
-
Which two are characteristics of RSVP?()
A . RSVP itself provides bandwidth and delay guarantees.
B . For RSVP to be end-to-end, all devices must support RSVP.
C . RSVP reservations are maintained by a centralized reservations server.
D . An RSVP compatible QoS mechanism must be used to implement guarantees according to RSVP reservations.
-
Which two are characteristics of the Front Controller pattern?()
A . It simplifies remote interfaces to distributed objects.
B . It promotes cleaner application partitioning and encourages reuse.
C . It provides an initial point of contact for handling all related requests.
D . It reduces maintainability due to the increased complexity of the design.
E . It provides loosely coupled handlers that can be combined in various permutations.
-
Which two characteristics are most typical of a SAN? ()
A . NICs are used for network connectivity.
B . Servers request specific blocks of data.
C . Storage devices are directly connected to servers.
D . A fabric is used as the hardware for connecting servers to storage devices.
E . The TCO is higher because of the cost of director class storage switches.
-
Which three are characteristics of IPv6?()
A . An IPv6 address is 128 bits long.
B . An IPv6 header contains the header checksum field.
C . An IPv6 header is 20 bits long.
D . An IPv6 header contains the next header field.
E . IPv6 route rs send RA messages.
F . An IPv6 header contains the protocol field.
-
Which two of these are characteristics of multicast routing? ()
A . multicast routing uses RPF
B . multicast routing is connectionless.
C . In multicast routing, the source of a packet is known.
D . When network topologies change, multicast distribution trees are not rebuilt, but use the originalpath
E . Multicast routing is much like unicast routing, with the only difference being that it has a a groupof receivers rather than just one destinatio
-
Which two characteristics are most typical of a SAN? ()
A . NICs are used for network connectivity.
B . Servers request specific blocks of data.
C . Storage devices are directly connected to servers.
D . A fabric is used as the hardware for connecting servers to storage devices.
E . The TCO is higher because of the cost of director class storage switches.
-
Which two are characteristics of the Service Locator pattern?()
A . It encapsulates component lookup procedures.
B . It increases source code duplication and decreases reuse.
C . It improves client performance by caching context and factory objects.
D . It degrades network performance due to increased access to distributed lookup services.
-
Which of the followings are demographic characteristics?