Enjoy 15% Discount With Coupon 15off

Monthly Archives - April 2018

Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the router to the server?

A single server in a company is connected via EtherChannel to a single upstream switch. Which EtherChannel load balancing method on the switch makes optimal use of the redundant links as traffic flows from the router to the server?A . source and destination MAC addressB . destination MAC addressC ....

Read more...

According to TOGAF, which of the following steps in Phases B, C, and D occurs before development of the baseline or target architectures?

According to TOGAF, which of the following steps in Phases B, C, and D occurs before development of the baseline or target architectures?A . Conduct formal stakeholder reviewB . Create Architecture Definition DocumentC . Define Roadmap componentsD . Perform gap analysisE . Select reference models, viewpoints and toolsView AnswerAnswer: E

Read more...

What Cisco product is designed to improve the performance of Windows file and exchange services in remote data centers?

What Cisco product is designed to improve the performance of Windows file and exchange services in remote data centers?A . Application Control EngineB . Wide Area Application ServicesC . Cisco Application Policy Infrastructure ControllerD . Cisco Prime Network Services ControllerView AnswerAnswer: B

Read more...

Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)

Which two statements about administrative access to the ACS Solution Engine are true? (Choose two.)A . The ACS Solution Engine supports command-line connections through a serial-port connection.B . For GUI access, an administrative GUI user must be created with the add-guiadmin command.C . The ACS Solution Engine supports command-line connections...

Read more...

What should you do?

You have a computer named Computer1. A user named User1 is a member of two groups named Group1 and Group2. You have a file named Doc1.docx that is located in E:Data. The file permissions for E:DataDoc1.docx are configured as shown in the exhibit. (Click the Exhibit button.) You need to...

Read more...

What technology can allow traffic to be routed in a more informed manner to utilize transport characteristics such as delay, loss, or link load?

Recently, the WAN links between the headquarters and branch offices have been slow under peak congestion, yet multiple alternate WAN paths exist that are not always congested. What technology can allow traffic to be routed in a more informed manner to utilize transport characteristics such as delay, loss, or link...

Read more...