High availability is enabled during the configuration of either HSRP or VRRP from global configuration mode
High availability is configured during the initial setup of both Fabric interconnects
High availability can only be configured via the CMC
High availability is enabled during theinitial configuration of one of the Fabric lnterconnects
第1题:
A. LDP uses Down Stream On Demand.
B. RSVP uses Down Stream On Demand.
C. LDP uses Down Stream Unsolicited.
D. RSVP uses Down Stream Unsolicited.
第2题:
A.Units in JUNOS are always required for any interface configured with logical addresses such as IP and IPv6.
B.Units in JUNOS are only required when you are configuring sub-interfaces for inter-VLAN routing.
C.Unit numbers must match the DLCI or VCI numbers configured on the interface.
D.Unit 0 is the only value allowed on interfaces running HDLC, PPP, or for Ethernet interfaces not doing VLAN-tagging.
第3题:
Which of the following statements is correct regarding an oil with a high viscosity index?
A.A large change of viscosity occurs with a minor change in temperature
B.No change in viscosity occurs with any change in temperature
C.Very little change in viscosity occurs with a significant change in temperature
D.The viscosity of the oil increases with an increase in temperature
第4题:
Which two EIGRP options will limit a query domain?()
第5题:
Which statement regaming high availabily in the Cisco UCS is correct?()
第6题:
A. Tunnels are initiated by the LAC
B. Tunnels are initiated by the LNS
C. By default, subscriber authentication occurs on the LNS
D. By default, subscriber authentication occurs on the LAC
第7题:
A.The Routing Engine handles all exception traffic.
B.The Routing Engine synchronizes the route table with the PFE
C.The Routing Engine is hot-pluggable.
D.The Routing Engine controls the PFE
第8题:
A. The same key is used for encryption and decryption.
B. It is commonly used to create digital certificate signatures.
C. It uses two keys: one for encryption and a different key for decryption.
D. An attacker can decrypt data if the attacker captures the key used for encryption.
第9题:
Which two statements regarding configuring high availabily in the Cisco UCS is correct?()
第10题:
Which two statements regarding SNMP monitoring of a UCS system are correct?()