网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()

  • A、Traffic that does not match any route in the forwarding table.
  • B、Traffic that exceeds the bandwidth of the interface.
  • C、Traffic of unsupported protocols on that interface.
  • D、Traffic arriving on unknown virtual-circuits on that interface.

参考答案

更多 “Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A、Traffic that does not match any route in the forwarding table.B、Traffic that exceeds the bandwidth of the interface.C、Traffic of unsupported protocols on that interface.D、Traffic arriving on unknown virtual-circuits on that interface.” 相关考题
考题 Which zone type will allow transit-traffic?() A.systemB.securityC.defaultD.functional

考题 A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

考题 Which extension to the OSPFv2 protocol supports traffic engineering?() A. LSA Type 8B. LSA Type 9C. LSA Type 10D. Transparent LSA

考题 Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?() A. oplockB. block lockC. bit range lockD. byte range lock

考题 Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?() A.Traffic that does not match any route in the forwarding table.B.Traffic that exceeds the bandwidth of the interface.C.Traffic of unsupported protocols on that interface.D.Traffic arriving on unknown virtual-circuits on that interface.

考题 Which OSPF LSA is used to support MPLS traffic engineering?()A、opaque LSA (Type 8)B、opaque LSA (Type 9)C、link LSA (Type 1)D、network LSA (Type 2)E、opaque LSA (Type 10)

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

考题 Which type of AAL does ATM utilize to deliver CBR traffic?()A、AAL2B、AAL 4C、AL 5D、AAL 1E、AAL 3

考题 A customer reports that their newly purchased Windows Vista Home Premium notebook is unable tosee other computers in their home office. Which of the following is the MOST likely cause? ()A、The Windows Defender service is turned on.B、The Network Location Type is Work.C、The Network Location Type is Private.D、The Network Location Type is Public.

考题 Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

考题 Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A、Inadequate RAMB、Slow processorC、PCI busD、Excessive network traffic

考题 When troubleshooting hardware issues with a server, which of the following is MOST likely to cause a problem in receiving vendor support?()A、 Third party cablesB、 Third party memoryC、 Signed driversD、 Server type

考题 Which two conditions will cause switch-to-wire to occur? ()(Choose two.)A、loss of powerB、QoS congestionC、software failure occuredD、WX device exceeded its license speedE、traffic does not match application definiton

考题 单选题Which of the following bottlenecks would MOST likely cause excessive hard drive activity?()A  Inadequate RAMB  Slow processorC  PCI busD  Excessive network traffic

考题 单选题Which OSPF LSA is used to support MPLS traffic engineering?()A opaque LSA (Type 8)B opaque LSA (Type 9)C link LSA (Type 1)D network LSA (Type 2)E opaque LSA (Type 10)

考题 单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()A It enables an attacker to perform an IP sweep of devices.B It enables a hacker to know which operating system the system is running.C It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D It creates a ping of death and can cause the entire network to be infected with a virus.

考题 单选题Which type of zone is used by traffic transiting the device?()A transit zoneB default zoneC security zoneD functional zone

考题 单选题Which type of AAL does ATM utilize to deliver CBR traffic?()A AAL2B AAL 4C AL 5D AAL 1E AAL 3

考题 多选题Which two statements are true about trust boundaries?()AClassifying and marking traffic should be done as close to the traffic source as possible.BClassifying and marking traffic should be done at the distribution layer.CTraffic is classified and marked as it travels through the network.DIf untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.EThe trust boundary moves depending on the type of traffic entering the network.

考题 单选题Which zone type will allow transit-traffic?()A systemB securityC defaultD functional

考题 单选题Which type of lock must be granted for the WX device to perform write acceleration on CIFS traffic?()A oplockB block lockC bit range lockD byte range lock

考题 单选题Which extension to the OSPFv2 protocol supports traffic engineering?()A LSA Type 8B LSA Type 9C LSA Type 10D Transparent LSA

考题 多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 单选题When troubleshooting hardware issues with a server, which of the following is MOST likely to cause a problem in receiving vendor support?()A  Third party cablesB  Third party memoryC  Signed driversD  Server type

考题 单选题Which type of traffic will cause Policed Discards errors on an interface on a JUNOS device?()A Traffic that does not match any route in the forwarding table.B Traffic that exceeds the bandwidth of the interface.C Traffic of unsupported protocols on that interface.D Traffic arriving on unknown virtual-circuits on that interface.