网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two statements are true about trust boundaries?()
A

Classifying and marking traffic should be done as close to the traffic source as possible.

B

Classifying and marking traffic should be done at the distribution layer.

C

Traffic is classified and marked as it travels through the network.

D

If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.

E

The trust boundary moves depending on the type of traffic entering the network.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.” 相关考题
考题 Click the Exhibit button.Assume the default-policy has not been configured.Given the configuration shown in the exhibit, which two statements about traffic from host_a in the HR zone to host_b in the trust zone are true? ()(Choose two.)A. DNS traffic is denied.B. HTTP traffic is denied.C. FTP traffic is permitted.D. SMTP traffic is permitted.

考题 Which two statements are true about pool-based source NAT? ()(Choose two.) A. PAT is not supported.B. PAT is enabled by default.C. It supports the address-persistent configuration option.D. It supports the junos-global configuration option.

考题 Which two statements are true about AH?() (Choose two.) A. AH provides data integrity.B. AH is identified by IP protocol 50.C. AH is identified by IP protocol 51.D. AH cannot work in conjunction with ESP

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.) A. Traffic is permitted from the trust zone to the untrust zone.B. Intrazone traffic in the trust zone is permitted.C. All traffic through the device is denied.D. The policy is matched only when no other matching policies are found.

考题 Which two statements are true about precedence values in policy?() (Choose two.) A. 1 is the default precedence.B. A lower number is preferred.C. A higher number is preferred.D. 100 is the default precedence.

考题 Which two statements about VACLs on Cisco Nexus 7000 Series Switches are true? ()A、 A single VACL can be shared across two or more VDCs.B、 Use of VACLs requires no special license to be installed.C、 VACLs make use of IP or MAC ACLs.D、 Only options drop and forward are permitted.

考题 You have been tasked with setting a trust boundary on the Company network.  What is the basic  function of this trust boundary?()A、 Trust boundaries are points in the network where Layer 2 CoS markings are converted to Layer  3 DSCP or IP precedence markings.B、 Trust boundaries are a point in the network where QoS functionality begins and ends.C、 Trust boundaries determine whether certain types of traffic can pass.D、 Trust boundaries are a point in the network where decisions about CoS markings on incoming  packets are made.E、 None of the other alternatives apply

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.

考题 Which two statements about the Cisco Nexus 1000V VSM are true?()A、It performs switching decisions and forwarding for the VEMB、It can be run on a virtual machineC、It can be used for remote VEM switching Iine cards

考题 Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

考题 You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

考题 Which two statements about VPLS are true? ()A、There is a full mesh of pseudowires.B、There is a partial mesh of pseudowires.C、Only L2TPv3 can be used for pseudowire establishment.D、There is split-horizon to avoid loops.

考题 Which two statements are true about pool-based source NAT? ()(Choose two.)A、PAT is not supported.B、PAT is enabled by default.C、It supports the address-persistent configuration option.D、It supports the junos-global configuration option.

考题 Which two statements are true about precedence values in policy?() (Choose two.)A、1 is the default precedence.B、A lower number is preferred.C、A higher number is preferred.D、100 is the default precedence.

考题 Which two statements are true regarding the system-default security policy [edit security policies default-policy]?()(Choose two.)A、Traffic is permitted from the trust zone to the untrust zone.B、Intrazone traffic in the trust zone is permitted.C、All traffic through the device is denied.D、The policy is matched only when no other matching policies are found.

考题 Which two statements are true about standard database auditing()A、DDL statements can be audited.B、Statements that refer to stand-alone procedure can be audited.C、Operations by the users logged on as SYSDBA cannot be audited.D、Only one audit record is ever created for a session per audited statement even though it is executedmore than once.

考题 Which two statements are true about record groups?()A、They are stored in the database. B、They are stored in local Forms memory. C、The type is specified explicitly at design time. D、The type is implied by when and how it is created.

考题 Which two statements about creating constraints are true?()A、Constraint names must start with SYS_CB、All constraints must be defines at the column levelC、Constraints can be created after the table is createdD、Constraints can be created at the same time the table is createdE、Information about constraints is found in the VIEW_CONSTRAINTS dictionary view

考题 多选题You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()ATrust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,BSetting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.CTrust boundaries are used to determine which QoS mechanism will be applied to the traffic.DAt the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.ETrust boundaries define the firewall rules for QoS admission into a network.

考题 多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

考题 多选题Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()AA device is trusted if it correctly classifies packets.BA device is trusted if it correctly declassifies packets.CThe outermost trusted devices represent the trust boundary.DClassification and marking occur using 802.1ab QoS bits before reaching the trust boundary.ENetwork trust boundaries are automatically configured in IOS version 12.3 and later.FFor scalability, classification should be done as close to the edge as possible.

考题 多选题By default, which two statements are true about export routing polices?()AExport polices can evaluate only active routesBExport polices can evaluate all routesCExport polices can be applied to the forwarding tableDExport polices can be applied to interfaces

考题 多选题Which two statements are true about AH?() (Choose two.)AAH provides data integrity.BAH is identified by IP protocol 50.CAH is identified by IP protocol 51.DAH cannot work in conjunction with ESP

考题 多选题Which two statements about creating constraints are true?()AConstraint names must start with SYS_CBAll constraints must be defines at the column levelCConstraints can be created after the table is createdDConstraints can be created at the same time the table is createdEInformation about constraints is found in the VIEW_CONSTRAINTS dictionary view

考题 多选题Which two statements about SCSI are true? ()AThe bus is limited to 32 devicesBIt is a full duplex serial standardCIt is a half-duplex serial standardDIt allows up to 320 MB/s of shared channel bandwidth

考题 多选题Which two statements are true about traffic shaping?()AOut-of-profile packets are queued.BIt causes TCP retransmits.CMarking/remarking is not supported.DIt does not respond to BECN and ForeSight Messages.EIt uses a single/two-bucket mechanism for metering.

考题 多选题Which two statements about IS reachability TLV (TLV 2) and the extended IS reachability (TLV 22) are true?()ATLV 22 supports wide metrics.BTLV 2 is only used in Level 1 routers.CTLV 22 displays the neighbor’s extended areas.DOnly TLV 22 can support the inclusion of sub-TLVs.EOnly TLV 22 can be flooded across L1/L2 boundaries.