网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
Which traffic descriptor is used for marking? ()
A

weighted RED (WRED) orange or green labels

B

modular QoS CLI (MQC) application layer tags

C

Deficit Round Robin (DRR) precedence bits

D

header compression tags

E

MPLS experimental bits

F

FIFO Layer 2 descriptor labels (L2DL)


参考答案

参考解析
解析: 暂无解析
更多 “单选题Which traffic descriptor is used for marking? ()A weighted RED (WRED) orange or green labelsB modular QoS CLI (MQC) application layer tagsC Deficit Round Robin (DRR) precedence bitsD header compression tagsE MPLS experimental bitsF FIFO Layer 2 descriptor labels (L2DL)” 相关考题
考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 Which two of these are characteristics of an IPS device?()A、 passively listens to network trafficB、 is an active device in the traffic pathC、 has a permissive interface that is used to monitor networksD、 traffic arrives on one IPS interface and exits on another

考题 Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()A、The use of a queuing method that will give VoIP traffic strict priority over other traffic  B、The use of RTP header compression for the VoIP traffic.C、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED for the VoIP traffic

考题 Which two statements describe traffic policing?()A、Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataB、Excess traffic is buffered so that the traffic remains within the desired rate.C、Packets that conform to traffic policies are not delayed.D、Packet marking is available and allows excess packets to be re-marked with a lower priorit

考题 Which statement best describes Cisco IOS Zone-Based Policy Firewall?()A、A router interface can belong to multiple zones.B、Policy maps are used to classify traffic into different traffic classes, and class maps are used to assignaction to the traffic classes.C、The pass action works in only one directionD、A zone-pair is bidirectional because it specifies traffic flowing among the interfaces within the zone-pair in both directions.

考题 Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

考题 Which unit is used for measuring traffic? ()A、ErlangB、Bit/secondC、HertzD、Subscribers/kHzE、Subscribers/minute

考题 Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

考题 Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted

考题 Which traffic descriptor is used for marking? ()A、weighted RED (WRED) orange or green labelsB、modular QoS CLI (MQC) application layer tagsC、Deficit Round Robin (DRR) precedence bitsD、header compression tagsE、MPLS experimental bitsF、FIFO Layer 2 descriptor labels (L2DL)

考题 Which QoS mechanisms can you use on a converged network to improve VoIP quality?()A、The use of a queuing method that will give VoIP traffic strict priority over other trafficB、The use of RTP header compression for the VoIP trafficC、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED

考题 Which two statements are true about the protocols that are used for transmitting voice traffic?()A、RTP multiplexing is used to keep multiple phone conversations separateB、RTP provides end-to-end delivery services for voice traffic.C、UDP is used to ensure a reliable transmission from sender to receiver.D、RTP is used to provide resource reservation for the voice stream.E、UDP provides multiplexing of multiple phone conversations.

考题 Which BGP attribute can be used to influence inbound traffic flow?()A、cluster IDB、WeightC、MEDD、local preferenceE、aggregate

考题 Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater

考题 Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

考题 多选题Which QoS mechanisms can you use on a converged network to improve VoIP quality?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP trafficCThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED

考题 单选题() is a circular traffic lane used at junctions of several routes,within which traffic moves counterclockwise around a separation point or zone.A Traffic LaneB RoundaboutC Inshore Traffic ZoneD Two-way Route

考题 单选题Which statement about HTTPS decryption on the WSA is true?()A if enabled, all HTTPS traffic must be decryptedB if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD object size can be used to determine whether the HTTPS traffic is to be decrypted

考题 单选题In MPLS traffic engineering, which one of the following protocols is used for Path Setup?()A BGPB OSPFC ISISD RSVP

考题 多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface

考题 多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.

考题 多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 单选题Which implicit object is used in a JSP page to retrieve values associated with  entries inthe deployment descriptor?()A ConfigB RequestC SessionD Application

考题 单选题Which of the following ports is used for HTTPS traffic by default?()A 80B 143C 443D 8080

考题 多选题Which three QoS mechanisms can be configured to improve VoIP quality on a converged  network?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP traffic.CThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED for the VoIP traffic

考题 多选题Which two statements describe traffic policing?()ATraffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataBExcess traffic is buffered so that the traffic remains within the desired rate.CPackets that conform to traffic policies are not delayed.DPacket marking is available and allows excess packets to be re-marked with a lower priorit