You want to implement a high availability network using two Cisco routers. You also want to ensure that the stat of the WAN interfaces can be tracked in doing so.
Which router redundancy protocol cannot be configured for interface tracking? ()
A. GLBP
B. HSRP
C. RPR
D. VRRP
E. SLB
F. RPR+
G. None of the other alternatives apply
您可能感興趣的試卷
你可能感興趣的試題
You need to configure two Company routers for high availability.
Which protocol enables a group of routers to form a single virtual router and use the real IP address of a router as the gateway address? ()
A. HSRP
B. IRDP
C. Proxy ARP
D. GLBP
E. VRRP
F. None of the other alternatives apply
You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure it to be installed in a high availability network. On a 3560 EMI switch,
which three types of interfaces can be used to configure HSRP?()
A. SVI interface
B. Access port
C. EtherChannel port channel
D. Loopback interface
E. Routed port
F. BVI interface
A. QoS classified at layer 3 using IP precedence or DSCP.
B. Guaranteed rate service.
C. Implemented using FIFO queues.
D. All traffic has an equal chance of being dropped.
The Company is rolling out Cisco’s Architecture for Voice, Video and Integrated Data (AVVID).
Which of the following choices represent the fundamental intelligent network services in Cisco’s AVVID? ()
A. Quality of Service (QoS)
B. Intelligent platforms
C. Mobility and scalability
D. Security
E. High availability
Refer to the exhibit.
What is the effect when the switchport priority extend cos 3 command is configured on the switch port interface connected to the IP phone?()
A. The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PC attached to the IP phone.
B. The switch will no longer tag incoming voice packets and will extend the trust boundary to the distribution layer switch.
C. RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link.
D. Effectively, the trust boundary has been moved to the PC attached to the IP phone.
E. The computer is now establishing theCoS value and has effectively become the trust boundary.
最新試題
Which three statements are true of the Link Aggregation Control Protocol (LACP)?()
Which two statements about the various implementations of STP are true?()
Refer to the exhibit. For what purpose is the command show ip cef used?()
What two things will occur when an edge port receives a BPDU?()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Which statement is correct about the use of the virtual interface on a WLC ?()
Refer to the exhibit. On the basis of the output of the show spanning-tree inconsistentports command, which statement about interfaces FastEthernet 0/1 and FastEthernet 0/2 is true?()
Refer to the exhibit and the partial configuration of switch SW_A and SW_B. STP is configured on all switches in the network. SW_B receives this error message on the console port:00:06:34: %CDP-4-DUPLEX_MISMATCH: duplex mismatch discovered on FastEthernet0/5 (not half duplex), with SW_A FastEthernet0/4 (half duplex) , with TBA05071417(Cat6K-B) 0/4 (half duplex). What would be the possible outcome of the problem?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Examine the diagram. A network administrator has recently installed the above switched network using 3550s and would like to control the selection of the root bridge.Which switch should theadministrator configure as the root bridge and which configuration command must theadministrator enter to accomplish this?()