网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which traffic descriptor s can be recognized and categorized by cisco quality of service(qos)features?()
A

 incoming interface.outgoing interface.ip precedence.and differentiated services code  P.oint(DSCP).

B

 Incoming interace.ip precedence.differentiated services code point(DSCP),and source or d.estination address.

C

 Outgoing interface.ip precedence.differentiated services code point(DSCP).and source or d.estination address.

D

 Incoming interface .outgoing interface.ip precedence and differentiated code point s.ervices(DCPS)

E

 Incoming interface .ip precedence .and source or destination address. 

F

 Outgoing interface.ip precedence .and source or destination address.


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which traffic descriptor s can be recognized and categorized by cisco quality of service(qos)features?()A  incoming interface.outgoing interface.ip precedence.and differentiated services code P.oint(DSCP).B  Incoming interace.ip precedence.differentiated services code point(DSCP),and source or d.estination address.C  Outgoing interface.ip precedence.differentiated services code point(DSCP).and source or d.estination address.D  Incoming interface .outgoing interface.ip precedence and differentiated code point s.ervices(DCPS)E  Incoming interface .ip precedence .and source or destination address. F  Outgoing interface.ip precedence .and source or destination address.” 相关考题
考题 Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

考题 Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.

考题 Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library

考题 You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

考题 Which four statements about NetFlow are true?()A、NetFlow records bidirectional IP traffic flow.B、NetFlow export can be implemented over IPv4.C、NetFlow export can be implemented over IPv6.D、NetFlow records multicast IP traffic flow.E、NetFlow records ingress traffic.F、NetFlow records egress traffic.

考题 Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted

考题 When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()A、 rate limit voice trafficB、 configure spanning-tree for fast link convergenceC、 isolate voice traffic on separate VLANsD、 classify and mark traffic close to the source

考题 Which traffic descriptor is used for marking? ()A、weighted RED (WRED) orange or green labelsB、modular QoS CLI (MQC) application layer tagsC、Deficit Round Robin (DRR) precedence bitsD、header compression tagsE、MPLS experimental bitsF、FIFO Layer 2 descriptor labels (L2DL)

考题 Which BGP attribute can be used to influence inbound traffic flow?()A、cluster IDB、WeightC、MEDD、local preferenceE、aggregate

考题 Which security mechanism can be directed through the  element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication

考题 Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication

考题 Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

考题 单选题Which traffic descriptor is used for marking? ()A weighted RED (WRED) orange or green labelsB modular QoS CLI (MQC) application layer tagsC Deficit Round Robin (DRR) precedence bitsD header compression tagsE MPLS experimental bitsF FIFO Layer 2 descriptor labels (L2DL)

考题 多选题Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()AICMP EchoBVoIP (RTP)CIPXDSNMP

考题 单选题Which BGP attribute can be used to influence inbound traffic flow?()A cluster IDB WeightC MEDD local preferenceE aggregate

考题 单选题Which statement about HTTPS decryption on the WSA is true?()A if enabled, all HTTPS traffic must be decryptedB if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD object size can be used to determine whether the HTTPS traffic is to be decrypted

考题 多选题Which of the following can be an expected outcome of a VLAN?()AVLANs logically divide a switch into multiple, independent switches at Layer 2.BTrunk links can carry traffic for multiple VLANs.CVLAN implementation significantly increases traffic due to added trunking information.DVLANs can span multiple switches.EVLANs typically decrease the number of switches needed

考题 多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface

考题 单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A  authorizationB  data integrityC  confidentialityD  authentication

考题 多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 单选题As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()A NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.B NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.D NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

考题 单选题Which attribute can influence inbound traffic flows from a neighboring AS?()A AggregatorB Local preferenceC Atomic aggregateD Multiple exit discriminator

考题 多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

考题 多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

考题 多选题Which four statements about NetFlow are true?()ANetFlow records bidirectional IP traffic flow.BNetFlow export can be implemented over IPv4.CNetFlow export can be implemented over IPv6.DNetFlow records multicast IP traffic flow.ENetFlow records ingress traffic.FNetFlow records egress traffic.

考题 多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.