You want to implement a high availability network using two Cisco routers. You also want to ensure that the stat of the WAN interfaces can be tracked in doing so.
Which router redundancy protocol cannot be configured for interface tracking? ()
A. GLBP
B. HSRP
C. RPR
D. VRRP
E. SLB
F. RPR+
G. None of the other alternatives apply
您可能感興趣的試卷
你可能感興趣的試題
You need to configure two Company routers for high availability.
Which protocol enables a group of routers to form a single virtual router and use the real IP address of a router as the gateway address? ()
A. HSRP
B. IRDP
C. Proxy ARP
D. GLBP
E. VRRP
F. None of the other alternatives apply
You have just purchased a new Cisco 3560 switch running the enhanced IOS and need configure it to be installed in a high availability network. On a 3560 EMI switch,
which three types of interfaces can be used to configure HSRP?()
A. SVI interface
B. Access port
C. EtherChannel port channel
D. Loopback interface
E. Routed port
F. BVI interface
A. QoS classified at layer 3 using IP precedence or DSCP.
B. Guaranteed rate service.
C. Implemented using FIFO queues.
D. All traffic has an equal chance of being dropped.
The Company is rolling out Cisco’s Architecture for Voice, Video and Integrated Data (AVVID).
Which of the following choices represent the fundamental intelligent network services in Cisco’s AVVID? ()
A. Quality of Service (QoS)
B. Intelligent platforms
C. Mobility and scalability
D. Security
E. High availability
Refer to the exhibit.
What is the effect when the switchport priority extend cos 3 command is configured on the switch port interface connected to the IP phone?()
A. The IP phone is enabled to override with aCoS value of 3 the existing CoS marking of the PC attached to the IP phone.
B. The switch will no longer tag incoming voice packets and will extend the trust boundary to the distribution layer switch.
C. RTP will be used to negotiate aCoS value based upon bandwidth utilization on the link.
D. Effectively, the trust boundary has been moved to the PC attached to the IP phone.
E. The computer is now establishing theCoS value and has effectively become the trust boundary.
最新試題
Refer to the exhibit. What command was issued on the Layer 3 switch Sw1 between Exhibit #1 and Exhibit #2?()
Refer to the exhibit. Initially, LinkA is connected and forwarding traffic. A new LinkB is then attached between SwitchA and HubA. Which two statements are true about the possible result of attaching the second link?()
Refer to the exhibit. STP has been implemented in the network. Switch SW_A is the root switch for the default VLAN. To reduce the broadcast domain, the network administrator decides to split users on the network into VLAN 2 and VLAN 10. The administrator issues the command spanning-tree vlan 2 root primary on switch SW_A. What will happen as a result of this change?()
Refer to the exhibit. The command switchport mode access is issued on interface FastEthernet0/13 on switch CAT1. What will be the result?()
Refer to the exhibit. For what purpose is the command show ip cef used?()
Which three statements are true of the Link Aggregation Control Protocol (LACP)?()
Which statement is correct about RSTP port roles?()
Which two statements about the various implementations of STP are true?()
Refer to the exhibit. Which Virtual Router Redundancy Protocol (VRRP) statement is true about the roles of the master virtual router and the backup virtual router?()
Based on the show spanning-tree vlan 200 output shown in the exhibit, which two statements about the STP process for VLAN 200 are true? ()