网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
What occurs on a Frame Relay network when the CIR is exceeded?()
A

All TCP traffic is marked discard eligible.

B

All UDP traffic is marked discard eligible and a BECN is sent.

C

All TCP traffic is marked discard eligible and a BECN is sent.

D

All traffic exceeding the CIR is marked discard eligible.


参考答案

参考解析
解析: 暂无解析
更多 “单选题What occurs on a Frame Relay network when the CIR is exceeded?()A All TCP traffic is marked discard eligible.B All UDP traffic is marked discard eligible and a BECN is sent.C All TCP traffic is marked discard eligible and a BECN is sent.D All traffic exceeding the CIR is marked discard eligible.” 相关考题
考题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?() A. When you want all unauthenticated traffic to be redirectedB. When you want all clear text traffic to be redirected.C. When you want all authenticated traffic to be redirected.D. When you want all encrypted traffic to be redirected.

考题 The following access list was applied outbound on he E0 interface connected to the 192.168.1.8/29 LAN:access-list 123 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.1.9 0.0.0.7 eq 21 anyWhat effect will this access list have?()A. All traffic will be allowed to exit E0 except FTP traffic.B. FTP traffic from 192.168.1.22 to any host will be denied.C. FTP traffic from 192.168.1.9 to any host will be denied.D. All traffic exiting E0 will be denied.E. All FTP traffic to network 192.168.1.8/29 from any host will be denied.

考题 On your newly installed router, you apply the access list illustrated below to interface Ethernet 0 on a Cisco router. The interface is connected to the 192.168.1.8/29 LAN.access-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 20 anyaccess-list 123 deny tcp 192.168.166.18 0.0.0.7 eq 21 anyHow will the above access lists affect traffic?()A. All traffic will be allowed to exit E0 except FTP traffic.B. FTP traffic from 192.168.166.19 to any host will be denied.C. FTP traffic from 192.168.166.22 to any host will be denied.D. All traffic exiting E0 will be denied.E. All FTP traffic to network 192.168.166.18/29 from any host will be denied.

考题 You are the network administrator at TestKing. You apply the following access list on the E0 outbound interface connected to the 192.168.1.8/29 LAN:access-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 20 anyaccess-list 21 deny tcp 192.168.1.8 0.0.0.7 eq 21 anyWhat will the effect of this access list be?()A. All traffic will be allowed to out of E0 except FTP traffic.B. FTP traffic from 192.168.1.22 to any host will be blocked.C. FTP traffic from 192.168.1.9 to any host will be blocked.D. All traffic will be prevented from leaving E0.E. All FTP traffic to network 192.168.1.9/29 from any host will be blocked.

考题 On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()A.SMTPB.DNSC.FTPD.TelnetE.HTTPF.POP3

考题 What occurs on a Frame Relay network when the CIR is exceeded?() A.All TCP traffic is marked discard eligible.B.All UDP traffic is marked discard eligible and a BECN is sent.C.All TCP traffic is marked discard eligible and a BECN is sent.D.All traffic exceeding the CIR is marked discard eligible.

考题 How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

考题 Th efollowing access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN:access-list 135 deny tcp 192.169.1.80.0.0.7 eq 20 anyaccess-list 135 deny tcp 192.169.1.80.0.0.7 e q21 anyHow will the above access lists affect traffic?()A.FTP traffic from 192.169.1.22 wil lbe deniedB.Not raffic,except for FTP traffic wil lbe allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

考题 What occurs on a Frame Relay network when the CIR is exceeded?()A、All TCP traffic is marked discard eligible.B、All UDP traffic is marked discard eligible and a BECN is sent.C、All TCP traffic is marked discard eligible and a BECN is sent.D、All traffic exceeding the CIR is marked discard eligible.

考题 What occurs on a Frame Relay network when the CIR is exceeded?()A、All TCP traffic is marked discard eligibleB、All UDP traffic is marked discard eligible and a BECN is sentC、All TCP traffic is marked discard eligible and a BECN is sentD、All traffic exceeding the CIR is marked discard eligible

考题 Th efollowing access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29LAN: access-list 135 deny tcp 192.169.1.80.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.80.0.0.7 e q21 any How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 wil lbe deniedB、Not raffic,except for FTP traffic wil lbe allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

考题 Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.

考题 The following access list below was applied outbound on the E0 interface connected to the 192.169.1.8/29 LAN: access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 20 any access-list 135 deny tcp 192.169.1.8 0.0.0.7 eq 21 any How will the above access lists affect traffic? ()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

考题 You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

考题 You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()A、data marked with DSCP AF21,VOIP marked with DSCP EFB、data marked with DSCP AF51,VOIP marked with DSCP EFC、data marked with the DE-bit,VOIP marked with the CLP-bitD、data marked with DSCP EF,VOIP marked with DSCP AF31E、data marked with IP precedence 5 VOIP marked with DSCP EF

考题 Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

考题 How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

考题 Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().A、requires access lists to identify the voice traffic B、can allow traffic from a device without 802.1X authentication, by MAC addressC、can allow traffic from Cisco IP phones by listening to their CDP advertisementsD、allows all packets marked with a ToS of 5 to bypass authenticationE、allows all IP voice packets to bypass authentication via stateful inspection

考题 You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A、When you want all unauthenticated traffic to be redirectedB、When you want all clear text traffic to be redirected.C、When you want all authenticated traffic to be redirected.D、When you want all encrypted traffic to be redirected.

考题 单选题A new server was installed for the purpose of monitoring network traffic. The network has been configured in such a way that all traffic will be mirrored out the port this server is connected to. When reviewing the network traffic logs on the server only traffic destined to the server is listed in the logs. Which of the following is preventing the server from seeing all network traffic?()A NIC filtering is enabled.B Port security is configured.C NIC is not in promiscuous mode.D NIC is in promiscuous mode.

考题 单选题What occurs on a Frame Relay network when the CIR is exceeded?()A All TCP traffic is marked discard eligibleB All UDP traffic is marked discard eligible and a BECN is sentC All TCP traffic is marked discard eligible and a BECN is sentD All traffic exceeding the CIR is marked discard eligible

考题 多选题You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()AThe access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tagBNo traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreCTraffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsDIP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offEMAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerFThe distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

考题 单选题What occurs on a Frame Relay network when the CIR is exceeded?()A All TCP traffic is marked discard eligible.B All UDP traffic is marked discard eligible and a BECN is sent.C All TCP traffic is marked discard eligible and a BECN is sent.D All traffic exceeding the CIR is marked discard eligible.

考题 多选题On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()ASMTPBDNSCFTPDTelnetEHTTPFPOP3

考题 单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()A data marked with DSCP AF21,VOIP marked with DSCP EFB data marked with DSCP AF51,VOIP marked with DSCP EFC data marked with the DE-bit,VOIP marked with the CLP-bitD data marked with DSCP EF,VOIP marked with DSCP AF31E data marked with IP precedence 5 VOIP marked with DSCP EF

考题 多选题Authentication for user data traffic is important, but so is authentication for IP voice traffic. The Cisco 830 802.1 feature provides an easier method for allowing IP voice traffic through the VPN, because it().Arequires access lists to identify the voice trafficBcan allow traffic from a device without 802.1X authentication, by MAC addressCcan allow traffic from Cisco IP phones by listening to their CDP advertisementsDallows all packets marked with a ToS of 5 to bypass authenticationEallows all IP voice packets to bypass authentication via stateful inspection

考题 多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.

考题 单选题You are configuring captive portal on your SRX Series device for guest user access.When would you use the redirect-traffic all command?()A When you want all unauthenticated traffic to be redirectedB When you want all clear text traffic to be redirected.C When you want all authenticated traffic to be redirected.D When you want all encrypted traffic to be redirected.