下沙论坛

 找回密码
 注册论坛(EC通行证)

用新浪微博连接

一步搞定

QQ登录

QQ登录

下沙大学生网QQ群8(千人群)
群号:6490324 ,验证:下沙大学生网。
用手机发布本地信息严禁群发,各种宣传贴请发表在下沙信息版块有问必答,欢迎提问 提升会员等级,助你宣传
新会员必读 大学生的论坛下沙新生必读下沙币获得方法及使用
查看: 3365|回复: 2
打印 上一主题 下一主题

Cisco CCDP 642-871 (下载)

[复制链接]
头像被屏蔽

该用户从未签到

跳转到指定楼层
1
发表于 2009-3-20 17:42:29 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
2 F$ m* B7 v7 o
CCDP 642-871 考试题库由我们的资深IT认证讲师及产品专家精心打造,包括了当前最新的全套全真642-871考试试题,全部附有正确答案。所有购买 killtest 认证考题的客户都将得到60天的免费升级服务,保证了对Designing Cisco network Service Architectures (ARCH)考试题库的完整覆盖。 killtest 助你一次通过 Designing Cisco network Service Architectures (ARCH) 认证考试,一次不过全额退款!1 p; e; j1 h! X  D9 l$ ?. g
killtest 642-871试题都是考试原题的完美组合,覆盖率96%以上,答案由多位专业资深讲师原版破解得出,正确率100%,只要您使用本站的题库参加 Designing Cisco network Service Architectures (ARCH) 考试,我们保证您一次轻松通过考试; 0 @# x- U, T6 j/ q/ S# W) ]
售后服务第一!我们相信要想在当今时代取得成功,必须为广大用户提供全套的周到细致的全程优质售后服务,只有客户满意了,我们才能发展。
* g$ m: S) |: S* ?0 z' F9 aKilltest 实行一次不过全额退款承诺。如果您购买我们的642-871题库,只要不是首次通过,凭盖有PROMETRICVUE考试中心钢印的考试成绩单,我们将退还您购买 642-871 考题的全部费用,绝对保证您的利益不受到任何的损失;
1 z) Z7 g' ^0 C- K; j; F1.Which typical enterprise campus requirement ensures that the network supports the required applications and that data flows within the required time frames?6 Q0 T% A# a- H' |
A.availability) `. m% ?! R8 o' g, ^/ }: i+ y) y
B.performance
' N0 M0 Z" [9 I3 u6 E1 j  r2 CC.functionality. L/ o7 q7 R; x! }
D.manageability
$ V* w1 M* |1 [3 U  R/ n5 ]+ a$ NE.scalability
8 y. T; l; y' m- s( B7 |" lCorrect:C
8 J) {$ a3 P2 ]- E  N2.What two choices can you make when redundancy is required from a branch office to a regional office? (Choose two.)
5 M0 e4 {' H8 gA.multiple Frame Relay PVCs
; G0 Q3 E: o: C$ }8 ]7 O6 aB.dual Wan links to the regional office
& A. T' U+ ?: b/ I2 d# G2 CC.dual Wan links to another branch office
3 w9 a0 H, o6 z5 HD.single links - one to the regional office and one to another branch office
/ Y: p- v. _5 N+ @! o+ GCorrect:B D 8 s/ d: g5 _  Z4 F% K9 E. H
3.What type of Call Admission control in CallManager allows for limits to the bandwidth consumed by active calls?8 u4 i6 c6 y8 @1 y. r% u
A.regions6 N& J# I2 v, E9 W
B.partitions3 Y: S" g& d3 {7 e; y( s
C.locations
. V5 N9 v2 b2 [! [: ?) yD.device Pools5 b2 e+ R9 w! p2 x1 U7 ^5 P$ E, Z
Correct:C
9 c# s) K  r8 p0 M4.Which VPN management feature would be considered to ensure that the network had the least disruption of service when making topology changes?$ p: R7 r9 g) K+ \  b- n" V2 i
A.dynamic reconfiguration8 O* j% U5 C, X9 }% O+ X) m
B.path MTU discovery
! I7 U7 `6 ^4 P2 u9 XC.auto setup0 `% @4 j( S7 t: \( J
D.remote management9 n: @$ o9 e, ~
Correct:A ( H8 C( r0 Q+ z- R# [3 ]: ]; Z
5.Refer to the exhibit. CCC Machine has decided to deploy a Voice over IP solution in its main campus headquarters. The design calls for the insertion of a Cisco CallManager, Cisco IP phones, and a voice gateway. Due to the new application requirements, what three changes should be made to the access layer of the CCC network design? (Choose three.)

* H* f4 A, \/ ]# IA.The trust boundary should be extended from the 3524-PWR access switches to include the IP phones.
4 j" `. J+ z) Q, U' J) qB.Ingress rate-limiting should be configured on 3524-PWR access switches to ensure Voice over IP bandwidth guarantees.' Q3 ]- J" Y% x. n7 _  L2 p* y
C.A new voice-only VLAN should be established and extended from the IP phones throughout the campus.' k1 ~9 y# Y0 i' U7 h
D.Configure the 3524-PWR access switches to ensure Voice over IP packets are given preferential treatment by enabling voice traffic to use separate queues.2 N5 P# M1 t2 c) R
E.Since end-user workstations cannot run CDP, disable it on the IP phones to improve performance and increase security.
4 S& ^% I" V' n1 pCorrect:A C D % N& {( d4 Z" {0 Q) E' H" M
6.Which three components are part of the Intelligent Network Services provided by the Cisco AVVID framework? (Choose three.)
$ P3 Q- ~! V* X; {5 \% U, k4 M1 BA.IP telephony% E1 z, [! v* R! g
B.security
' v# N# n. v, }6 J/ g  d. mC.IP multicasting" v# ]  M+ B( r6 e2 n' n
D.work force optimization
2 H) b3 N8 K) _) ^2 \E.e-business infrastructure
$ S1 o  m( a* o- C( _4 R! M/ GF.QoS
; _7 W+ _/ I( q" X# m: O) U' H& ]Correct:B C F , e( @& e  g: a# C1 o- d) c
7.Which three best practices should be implemented at the campus backbone submodule to support the server farm module? (Choose three.)8 O1 i1 U( S4 W% I
A.Implement highly redundant switching and links with no single points or paths of failure.
( h/ q- p5 U- x* C. W2 _B.Implement server load balancing.
6 i+ J4 V, c# iC.Implement the Hot Standby Router Protocol (HSRP) for failover protection.
% a4 U( [" x/ P; ~, O8 w# a" eD.Dual home all servers.$ \* D9 Y( K) e0 Y2 l. @* x* O
E.Implement intrusion detection with automatic notification of intrusion attempts in place.6 \; a7 J+ u0 \# ]6 C- p* a
F.Deploy caching systems.' `  M4 `; P( \9 B8 j
Correct:A C E
6 E8 S/ u" r9 F7 n5 a- U8.The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to-router) basis?
, }; r6 V9 W( d$ }" R  pA.nGenius Real-Time Monitor
+ u- V, [) l# k# k8 }1 z- TB.CiscoView5 V$ \/ \& k" j5 u
C.Device Fault Manager
& i" B/ Y# w/ Q( A" B1 y2 L* rD.Internetwork Performance Monitor
2 W( J+ G2 a, k  ]/ MCorrect 5 B! K* u6 C: j+ N$ g9 f4 m
9.Look at the picture.

' P4 N5 V! Y! bCorrect:3 S* E$ c* Z. K: e4 W" Q
10.Which protocol would provide block access to remote storage over WAN links?4 ?! A- x+ [' V( e4 @3 A& m
A.iSCSI
: k  p0 m5 E) E; j2 G$ S; j9 S& FB.FCIP
) s+ l* q0 h! v5 e5 UC.SCSI-FP
5 [# i% W8 n+ y3 }: f# @& R6 g: ID.eSCSI
5 Y4 L+ D, s' @& H4 gE.CIFS; m* W! f/ Y2 o- ^# w* J" ]9 l
Correct:A
+ u' Q" `$ y. j. f% _4 u) g
文章摘自: http://www.1k0-002.cn/post/7.html
分享到:  QQ好友和群QQ好友和群 QQ空间QQ空间 腾讯微博腾讯微博 腾讯朋友腾讯朋友
收藏收藏 分享分享 顶 踩 转发到微博

该用户从未签到

2
发表于 2009-3-30 00:50:04 | 只看该作者

看过

挺不错的。不知道其他人这么看
6 k- A: t  i; I* L$ a
( N) U: S3 v2 L3 B8 s
$ E7 Q! Z! y3 U8 h) n( e1 N( p, w) i* j' ^  a2 ~5 q5 t
/ `% X' d) [3 c  R( Y4 C

6 Z8 t' u6 W6 F/ f8 c: ~7 z3 d- Q9 W8 q
- |% Z. V$ F9 U- q

5 \: O7 M' K* M9 ~. W7 T- r7 M- ^) X. N  W: \: r$ M" \
! l( |# ]/ w" E) d9 l' `2 S

" D* l: x; Q, X( G- Y
0 [0 s" q* F; q0 n+ P* ]
# ^! ~/ M# r* w# s2 K7 S% R9 f+ }8 ~+ D8 m2 @

3 |' P! y& P7 S
9 L$ t4 d) X1 e每天都在找游戏问道官网
回复 支持 反对

使用道具 举报

本版积分规则

关闭

下沙大学生网推荐上一条 /1 下一条

快速回复 返回顶部 返回列表