New Questions Flashcards

1
Q

How many virtual routers can GLBP support?

A

1024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If you need multivendor FHRP what do you use?

A

VRRP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What gigabit ethernet technology reaches the furthest without a repeater?

A

1000BASE-LX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
What three L2 designs are used for the access layer?
looped square
loop free square
looped U
loop free U
looped triangle
loop-free triangle
A

Looped square
Looped triangle
Loop free U

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What servers from the data center block need direct connection to all other blocks?

network mgmt servers
web server
AD server
dhcp server

A

network mgmt servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
  1. Data Center cable management with high server density, the options where:
A
  • Top of Rack (X)

- End of Row (X)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which module of enterprise contains the following: dns/http/smtp servers, firewall?

A

Internet connectivity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
A campus network needs end-to-end QoS tools to manage traffic and ensure voice quality. Which three types of QoS tools are needed?
(A) interface queuing and scheduling
(B) congestion management
(C) compression and fragmentation
(D) bandwidth provisioning
(E) traffic classification
(F) buffer management
A

A, D, E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which layers are usually collapsed in medium sized networks?
Access
Core
Distribution
DC Layer
A

Core

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

ISR features question

A

INSERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

VoIP configuration names

A

single site, centralized multisite, and distributed multisite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
What IPT component supports QoS, PoE, VoIP?
(A) Client endpoints
(B) Call processing
(C) Service applications
(D) Voice-enabled Infrastructure
A

Voice-enabled infrastructure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the major benefits of using a VPN?

A

Flexibility, cost, and scalability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

VDCS

A

INSERT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
Which mechanisms are required to deploy QoS on an IP WAN?
(A) queuing and scheduling
(B) Call admission Control
(C) traffic shaping
(D) link efficiency techniques
(E) traffic classification
A

Answer = B,C,D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What two devices are used in the teleworker solution?

A

880 router

ISR G2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which one of these statements should the designer keep in mind when considering the advanced routing features?

A.
one-way router redistribution avoids the requirement for state or default routes.

B.
Redistribution, summarization, and filtering are most often applied between the campus core and enterprise edge.

C.
Filtering only occurs on the routing domain boundary using redistribution.

D.
Summarize routes at the core toward the distribution layer.

E.
The hierarchical flexibility of IPv6 addressing avoids the requirements for routing traffic reduction using aggregation.

A

Answer A is incorrect as a default route is still required Answer B & D are incorrect as Redistribution, summarization, and filtering are used in the Distribution Layer Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 1, Page 36 37
Answer C is incorrect as route filter can occur at either a routing domain boundary or at a routing redistribution point. Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter Answer E is correct as IPv6 allow the aggregation (summarization) of routing prefixes to reduction of the number of routes in the global routing table. Cisco Press CCDA 640-864 Official Certification Guide Fourth Edition, Chapter 9

Note: Core Layer
The core layer is the network’s high-speed switching backbone that is crucial to corporate communications. It is also referred as the backbone. The core layer should have the following characteristics:

Distribution Layer
The network’s distribution layer is the isolation point between the network’s access and core layers. The distribution layer can have many roles, including implementing the following functions:

You can use several Cisco IOS Software features to implement policy at the distribution layer:
Route Filtering
Filtering of routes can occur on either a redistribution point or in the routing domain to prevent some parts of the network from accessing other sections of the network.

Filtering at a redistribution point provides the following:

Global Aggregatable IPv6 Address
Global aggregatable unicast addresses allow the aggregation of routing prefixes. This allows a reduction of the number of routes in the global routing table. These addresses are used in links to aggregate (summarize) routes upwards to the core in large organizations or to ISPs. Global aggregatable addresses are identified by the fixed prefix of 2000:/3. As shown in Figure 9-5, the format of the global aggregatable IPv6 address is a global routing prefix starting with binary 001, followed by the subnet ID and then the 64-bit interface identifier (ID). The device MAC address is normally used as the interface ID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which one of these statements is true about addressing redundancy within the WAN environment?

A.
The reliability and speed of DSL allow for cost savings by not including redundant links.

B.
CAMDM and dark fiber offer advanced redundancy features such as automatic backup and repair mechanism to cope system faults.

C.
An SLA is one way to eliminate the need for redundancy.

D.
The failure of a single SONET/SDH link or network element does not lead to failure of the entire network.

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which one of these statements is true concerning the enterprise data center?

A.
It can be located either at the enterprise campus or at a remote branch.

B.
Remote data center connectivity requirements align with the small office design.

C.
The data center designs will differ substantially depending on whether the location is on campus or remote.

D.
A remote branch with a data center becomes the enterprise campus.

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

According to Cisco, which four improvements are the main benefits of the PPDIOO lifecycle approach to network design? (Choose four)

A.
faster ROI

B.
improved business availability

C.
increased network availability

D.
faster access to applications and services

E.
lower total cost of network ownership

F.
better implementation team engagement

A

B C D E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which two statements best describe an OSPF deployment? (Choose two)

A.
ABR provides automatic classful network boundary summarization.

B.
ABR requires manual configuration for classful network summarization

C.
External routes are propagated into the autonomous system from stub areas via ASBR.

D.
External routes are propagated into the autonomous system from regular areas or NSSA via ASBR.

E.
External routes are propagated into the autonomous system from regular areas or NSSA via ABR.

A

B D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A large enterprise requires sensitive information be transmitted over a public infrastructure. It requires confidentiality integrity, and authenticity. Which security solution best meets these requirements?

A.
Cisco IOS Firewall

B.
Intrusion Prevention

C.
IPSEC

D.
AAA

E.
Traffic Guard Protector

F.
SECURE CONECTIVITY

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Which statement describes the recommended deployments of IPv4 addressing in the Cisco Network Architecture for the Enterprise?

A.
private addressing throughout with public addressing n the Internet Connectivity module

B.
private addressing throughout with public addressing n the Internet Connectivity and E- Commerce modules

C.
private addressing throughout with public addressing m the Internet Connectivity, E-Commerce, and Remote Access and VPN modules

D.
private addressing throughout with public addressing in the Internet Connectivity, E-Commerce, and Enterprise Branch modules

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which network scenario is static routing most appropriate?

A.
parallel WAN links

B.
IPSec VPN

C.
expanding networks

D.
hierarchical routing

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of these is the equation used to derive a 64 Kbps bit rate?

A.
2 x 8 kHz x 4-bit code words

B.
8 kHz x 8-bit code words

C.
2 x 4-bit code words x 8 kHz

D.
2×4 kHz x 8-bit code words

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which three terms describe the primary functions of the distribution layer of the campus network design hierarchy? (Chose three)

A.
provides end-user connectivity

B.
provides high speed transport

C.
provides QoS services

D.
enforces security policies

E.
provides WAN connection

F.
connects access devices to the core backbone

A

C D F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which codec does Cisco recommend tor WAN link?

A.
G.711

B.
G 723

C.
G 728

D.
G 729

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which two of these best describe the implementation of a WAN Backup design over the Internet? (Choose two.)

A.
a best-effort method

B.
bandwidth guaranteed based on interface configuration

C.
designed as an alternative to a failed WAN connection

D.
implemented with a point-to-point logical link using a Layer 2 tunnel

E.
requires no ISP coordination or involvement

A

A C`

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which three pieces of information should be documented for each step of each phase in a design implementation plan? (Choose three.)

A.
easy guidelines in case of failure

B.
estimated rollback time in case of failure

C.
simple implementation guidelines

D.
estimated implementation time

E.
design document references

F.
step description

A

D.
estimated implementation time

E.
design document references

F.
step description

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which three types of WAN topologies can be deployed in the Cisco Enterprise Architecture Enterprise Edge WAN module? (Choose three.)

A.
ring

B.
full mesh

C.
partial mesh

D.
collapsed core

E.
star

F.
core

G.
edge

A

B C E

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the modes of unicast reverse path forwarding?

A) Strict Mode
B) Loose Mode
C) VRF Mode
D) Global
E) Local
A

A B C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

This:

SNMP – Defines how information is exchanged…
RMON – provides complete network visibility from physical to application
CDP – runs over data link layer…
Netflow – processes larger ACLs efficiently…

A

Other side.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

There was a network topology diagram (configured with EIGRP and OSPF) and the question was on which router will the redistribution be performed.

A

– Router2 (between OSPF and

EIGRP areas).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Advantage of colocating datacenter

A

(Ans.improved redundancy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Netflow can do what?

A

– processes larger ACLs efficiently…

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What are three basic design approaches for packet-switched networks? (Choose three.)

A

Fully meshed, partially meshed, hub and spoke

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q
  1. Which three parameters can you identify by using a traffic analyzer? (Choose three.)
    protocol specification (IP protocol ID, TCP/UDP port number)
    average bit rate and packet rate
    QoS requirements
    importance of the application
    devices that use a specific protocol and their addresses
A

1,b,e

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What are the benefits of PPDIOO

A

Lowers total cost of ownership
Increases network availability
Improves business agility
Speeds up access to applications and services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q
Which item is not an SNMP opeartion
GetNext
Community
Trap
Set
A

Community

40
Q

During which phase of the PPDIOO model would you conduct interviews with supporting staff to develp and propose a viable solution

A

Prepare

41
Q

What are the two most likely driving forces motivating businesses to integrate voice and data into converged networks?

A

Data, voice, and video cannot converge on their current PSTN structures

WAN costs can be reduced by migrating to converged networks

42
Q

During which stage of the PPDIOO process are implementation procedures prepared?

A

Design

43
Q

Which three solutions are part of the borderless network services?

Wireless
Routing
TrustSec
MediaNet
Switching
EnergyWise
Next-Gen WAN
A

TrustSec
MediaNet
EnergyWise

44
Q

Which three mechanisms are required to deploy QoS on an IP WAN?

queuing and scheduling
Call Admission Control
Traffic shaping
link efficiency techniques
Traffic classification
bandwidth provisioning
A

C, D, E

45
Q

What is part of the prepare phase of PPDIOO?

Obtain site contact info
Perform network audit
Identifiy customer requirements
Perform gap analysis

A

Identify customer requirements

46
Q

When designing a WAN backup for voice and video applications what types of connections should be used?

Private WAN
internet
ISDN
MPLS
dial-up
ATM
DSL
A

Private WAN
ISDN
MPLS

47
Q
Observe the following options in which section of the network document does CIsco recommend a discussion of performance, scalability, capacity, security, and traffic needs?
Design summary
design solution
executive summary
design requirements
A

design requirements

48
Q

Which aspect would most likely be found in the draft design document
A list of QoS requirements
a note that thre are no segments with more than 70% broadcast or multicast traffic
the level of redundancy or high availabilty that currently exits or is required in the netowkr
the list of network infrastructure services which are in use such as voice and video

A

a list of QoS requirements

49
Q

Which of the following three options represents the components of the teleworker solution?

Cisco Unified IP Phone
Cisco 880 Series router
Aironet Office Extend Access Point
Catalyst 3560 Series Switch
Cisco 2900 Series Router
MPLS Layer 3 VPN
Leased Lines
A

ABC

50
Q

At which stage in the PPDIOO process would you analyze a customer’s network in order to discover opportunities for network improvement?

Operate
Implement
Plan
Design
Prepare
Design Assessment
A

Design

51
Q

Which information should a network summary report identify?
actions needed to support the existing network
customer requirements
new network features
customer requirement modifications
actions needed to support existing network features
infrastructure shortcomings

A

infrastructure shortcomings

52
Q

Which two capabilities of NetFlow accounting assist designers with network planning?

the monitoring of processor time on network devices
the calculation of packet and byte counts of network traffic
the decoding and analyzing of packets
the presentation of a time-based view of application usage on the network
the monitoring of user network utilization

A

B

E

53
Q

When designing using the Cisco enterprise architecture, in which enterprise campus layer do the enterprise edge and enterprise wan modules establish their connection?

Building access
building distribution
campus core
enterprise branch
enterprise data center
A

campus core

54
Q
Which types of communicating devices compose RMON architecture?
router
switch
management station
monitor
A

management station

monitor

55
Q

Which Cisco technology using Nexus NX-OS infrastructure allows the network architect to create up to four separate control and data plane instances of the Nexus chassis?

virtual port-channel
virtual routing and forwarding
virtual switching system
virtual device context

A

virtual device context

56
Q

Which two techniques can reduce voice packet transfer delay across a link of less than 512 kbps

deploy lfi
increase link bandwidth
extend the trust boundray
deploy software compression
increase queue depth
A

deploy LFI

increase link bandwidth

57
Q

Which three statements are true regarding the virtual interface on a Cisco Wireless LAN controller

supports mobility management
serves as a DHCP relay
used for all controller to AP communication
supports embedded Layer 3 security
default for out-of-band management
default for in-band management
provides connectivity to AAA servers
A

ABD

58
Q

Spanning layer 2 across geographically separate data centers is a key consideration for current data center designs. Which is the name of the NX-OS technology that facilitates MAC in IP transport for Layer 2 VLANs across any IP network

A

overlay transport virtualizations

59
Q

For the following options which emerging wan technology uses DSL coding and digital modulation techniques with ethernet

cable
wireless
smds
long-reach ethernet(LRE)

A

long reach ethernet

60
Q

The cisco data center network architecture comprisis which two cisco SONA layers

collaboration applications
wan/internet
interactive services
network infrastructure
business applications
A

interactive services

network infrastructure

61
Q

High availability is a key design consideration in the enterprise campus network. In a fully redundant topology, which is likely to provide faster IGP convergence during a failure.

redundant supervisors
redundant supervisors with cisco nonstop forwarding and stateful switchover
single supervisors with tuned igp timers
single supervisors

A

single supervisors with tuned IGP timers

62
Q

Which three are security services offered through cisco router security

trust and identity
integrated threat control
unified wireless network security solution
secure connectivity
voice-messaging security
endpoint security
virtual security gateway
A

ABD

63
Q

You are asked to design a new branch office that will need to support 25 users. These users will be using an ISP connection and will need to connect to the main office for network services. Which two cisco devices are the most appropriate to fulfill all these requirements?

cisco ips
cisco ISR G2
Cisco ASA
Cisco 2960
Cisco CRS-1
Cisco ACS
A

BC

64
Q

Which one of these statements should the designer keep in mind when considering the advanced routing features?

one way router redistribution avoids the requirement for state or default routes

redistribution, summarization and filtering are most often applied between campus core and enterprise edge

filtering only occurs on the routing domain boundary using redisturbition

summarize routes at the core towoard the distribution layer

the hierarchical flexibility of IPv6 addressing avoids the requirement for routing traffic reduction using aggregation

A

B

65
Q

Which two encryption transforms will be used by both ESP and AH for authentication?

A

HMAC-MD5 or Hash Message Authentication Code-Secure Hash ALgorithm

66
Q

Which standard language will be used by SNMP to define the device information to be stored

A

ASN.1

67
Q

What is SLC

A

service level contract

68
Q

Which is the remote monitoring agent in the RMON architecture called?

Tree
Station
Agent
Probe

A

Probe

69
Q

Which three are features of LWAPP? (Choose three.)

A. firmware synchronization
B. local management of APs
C. configuration changes manually synced
D. encryption of control channel
E. configuration data only on the WLC
F. wireless control free operation
G. replaces 802.1x for authentication in wireless connections
A

ADE

70
Q

Which of these statement is true concerning the data center access layer design

the access layer in the data center is typically built at layer 3 which allows for better shaping of services across multiple servers

with layer 2 access the default gateway for the servers can be configured at the access or aggregation layer

a dual homing nic requires a vlan or trunk between the two access switches to support the dual ip address onthe two server links to two separate switches

the access layer is normally not required as dual homing is standard from the servers to the aggregation layer

A

B

71
Q

Which two statements about the data center aggregation layer are correct

layer 4 through layer 7 services are provided in that layer
stp should never be support in that layer
that layer is the critical point for application services
layer 2 connectivity is provided in that layer from the data center to the core

A

a c

72
Q

When building global network businesses which three principles should be used

A

customer focus continuous standardization and core versus context

73
Q

Which is the purpose of the NAC profiler

automates discovery and inventory of all lan attached devices
generates a profile based on username and group
learns and creates a database of virus definnotions based on lan traffic
a database used to map user vpn accounts

A

A

74
Q

Which two design methodology steps relate, at least in port, to the implment phase of the PPDIOO process?

verifying  the network
testing design
determining customer requirements
characterizing the existing network
establishing the organizational requriments
A

AB

75
Q

Which WLC interface is dedicated for WLAN client data?

virtual interface
dynamic interface
management interface
AP manager interface
service port interface
A

dynamic interface

76
Q

Which two solutions are parts of the Cisco security management suite

asa
cisco security agent
NAC appliance
CSM
PIX
Cisco Security MARS
A

DF

77
Q

What does ODR stand for?

A

On demand routing

78
Q

What is primary consideration when choosing a routed netowrk design over a traditional campus network design

layer 3 service support at the network edge
the routing protocol choice open ospf or proprietary eigrp
the routing abilities of the host devices
the need to control the broadcast domains within the campus core

A

a

79
Q

Your boss is interested in a wireless WAN solution which provides higher bandwidth than point-to-multipoint (pmp) wireless. Which description is correct?

Service providers cannot install point-to-point (p2p) links from a p2mp hub

P2p wireless connections can provide up to 44 Mbps raw bandwidth

P2p links tend to be slower than p2mp

P2mp wireless connections can provide up to 1.544 Mbps raw bandwidth

A

B

80
Q

Which two statements best describe the implementation of Overlay VPN connectivity for remote access in the Enterprise Edge WAN module? (Choose two.)

A.
It must use Layer 2 labels to forward packets

B.
It uses dedicated point-to-point links.

C.
Bandwidth is provisioned on a site-to-site basis.

D.
The ISP actively participates in customer routing.

E.
Optimum routing between customer sites requires a full mesh of virtual circuits.

A

A C

81
Q

Which advantage is of security systems that are part of the Cisco ecosystem?

A.
There is a suite of products to choose from.

B.
Various partners as well as supporting products increase the effectiveness of security systems.

C.
There are no advantages.

D.
The Cisco ecosystem ensure that partners can implement the solution.

A

B

82
Q

Which two features are supported by single wireless controller deployments?

A. automatic detection and configuration of LWAPPs
B. LWAPP support across multiple floors and buildings
C. automatic detection and configuration of RF parameters
D. Layer 2 and Layer 3 roaming
E. controller redundancy
F. mobility groups

A

AB

83
Q

Which one of these statements describes why, from a design perspective, a managed VPN approach for enterprise teleworkers is a most effective?

A.
A managed VPN solution uses a cost effective, on-demand VPN tunnel back to the enterprise

B.
This solution supports all teleworkers who do not require voce or video

C.
This architecture provides centralized management where the enterprise can apply security policies and push configurations.

D.
It provides complete flexibility for remote access through a wireless hotspot or a guest network at a host, in addition to a home office.

A

C

84
Q

When designing using the cisco enterpries architecture in which enterprise campus layer does the remote access and vpn module establish its connection

building access
campus core
enterprise branch
enterprise data center

A

campus core

85
Q

In the enterprise data center, which are the three main components?

network infrastructure
interactive services
data center management
internet services
wan services
vpn and remote access
A

ABC

86
Q

Which three technologies are recommended to be used for WAN connectivity in today’s Enterprise Edge designs? (Choose three.)

A. DWDM
B. Metro Ethernet
C. Frame Relay
D. MPLS VPN
E. ISDN
F. DSL
G. Wireless
A

ABD

87
Q

In which phase of PPDIOO are the network requirements identified?

A

Plan

88
Q

What is the benefit of deploying a gatekeeper in an H.323 IP telephony network?

provides spatial redundancy through the use of HSRP
provides load balancing via GUP when alternate gatekeepers are deployed
reduces configuration complexity by centralizing the dial plan
increases redundancy by allowing each gateway to maintain a copy of the dial plan

A

C

89
Q

When designing for a remote worker, which are two typical requirements?

best effort interactive and low volume traffic patterns
connections to the enterprise edge using layer 2 wan technologies
alyways-on connection with sla from isp
voice and ipsec vpn support
high-end security devices with stateful firewall filtering
dual or multihoming to isps

A

always-on connection with sla from isp

voice and ipsec vpn support

90
Q

The network-design process is limited by many external constraints. which origins are of these constraints

A

technological, political, social, economical

91
Q

Where in the cisco enterprise architecture does network management reside?

A

enterprise campus module

92
Q
Which is a factor in enterprise campus design decisions?
network application characteristics
routing protocol characteristics
switching latency characteristics
packet filtering characteristics
A

network application characteristics

93
Q

When considering the three VoIP design models single site, centralized multisite, and distributed multisite which question below would help to eliminate one of these questions?

A.
Will the switches be required to provide inline power?

B.
Will users need to make off site calls, beyond the enterprise?

C.
Will users require applications such as voice mail and interactive voice response?

D.
Are there users whose only enterprise access is via a QoS-enabled WAN?

A

D

94
Q

What are three valid methods of gathering information about an existing data network? (Choose three.)

A.
Use organizational input.

B.
Analyze the user-mapping of a running application.

C.
Perform a traffic analysis.

D.
Perform a packet-level audit to verify carrier service guarantees.

E.
Use reports that analyze the metrics of the customer’s existing network.

F.
Perform a network audit to gather more detail about the network.

A

CEF

95
Q

Where do you put DNS and DHCP on enterprise model. select two

enterprise campus server farm module
enterprise edge
sp edge premise
enterprise branch

A

AD

96
Q

As a network engineer can you tell me accounting managmenet on network management system allows a network manager to perform which function

assess the networks effectiveness and throughput
charge back to users for network resources
performance managament
identify problem areas in the network

A

charge back to users for network resources

97
Q

The evolution of the Data Center is best represented by the 3.0 architecture component of virtualization. Which of the following is not an example of the virtualization taking place in the Data Center ?

a) VLANs and VSANs provide for virtualized LAN and SAN connectivity, separating physical networks and equipment into virtual entities.
b) Virtual machines that run on application within the client operating system, is future virtualized and running on common hardware.
c) Storage devices virtualized into Storage pools, and network devices are virtualized using device contexts
d) virtualized media access utilizing Fibre Channel over Ethernet.

A

B