网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

TCAS的英文全称为()。

  • A、Traffic alert and Collision Advoidance System
  • B、Traffic Collision and Alert System
  • C、Traffic Control and Service
  • D、Traffic Condition and Surveillance

参考答案

更多 “TCAS的英文全称为()。A、Traffic alert and Collision Advoidance SystemB、Traffic Collision and Alert SystemC、Traffic Control and ServiceD、Traffic Condition and Surveillance” 相关考题
考题 他们配合警察, 协管周围道路的车辆和行人A.They will assist the police to supervise the traffic and passengers as wellB.They will help the police to control the traffic and pedestrians as well.C.They will cooperate with the police in checking the traffic and pedestrians as well.D.They will obey the police to control the traffic and pedestrians as well.

考题 Systems of inbound and outbound lanes to promote the safe flow of vessel traffic in certain areas around the world are known as ______.A.merchant vessel reporting systemsB.traffic separation schemesC.collision avoidance fairwaysD.restricted maneuverability channels

考题 Which zone type will allow transit-traffic?() A.systemB.securityC.defaultD.functional

考题 Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?() A. The traffic will be rejected.B. The traffic will be dropped.C. The traffic will be forwarded.D. The traffic will be policed.

考题 How will the above access lists affect traffic?() A.FTP traffic from 192.169.1.22 will be deniedB.No traffic, except for FTP traffic will be allowed to exit E0C.FTP traffic from 192.169.1.9 to any host will be deniedD.All traffic exiting E0 will be deniedE.All FTP traffic to network 192.169.1.9/29 will be denied

考题 What are two reasons that a network administrator would use access lists (Choose two.)()。 A.to control vty access into a routerB.to control broadcast traffic through a routerC.to filter traffic as it passes through a routerD.to filter traffic that originates from the routerE.to replace passwords as a line of defense against security incursions

考题 ______ is not likely to be a methods of Traffic Separation.A.Separation of opposing streams of traffic by separation zones or linesB.The separation of through traffic from local traffic by provision of inshore traffic zonesC.Division of traffic from several different direction into sectorsD.Control of routing traffic through shipping routes

考题 TCAS中,出现TA时有:().A、一次音响警告”TRAFFIC,TRAFFIC”B、HIS上出现TRAFFIC信息C、HIS上出现TA符号D、以上都有

考题 TIS-B(交通信息服务广播)的英文全称为()。A、Traffic Message Service-BroadcastB、Traffic Information Server-BroadcastC、Traffic Information Service-Broadcast

考题 What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()A、 The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.B、 The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.C、 The Ethanalyzer captures only data traffic, while SPAN captures all traffic.D、 The Ethanalyzer captures only control traffic, while SPAN captures data traffic.

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 Which statement is true about the comparison of voice traffic with video traffic?()A、 Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B、 Latency requirements are less stringent for video traffic than for voice traffic.C、 Video traffic is less sensitive to dropped packets than for voice traffic.D、 Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E、 Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F、 Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

考题 Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

考题 What are two reasons that a network administrator would use access lists (Choose two.)()。A、to control vty access into a routerB、to control broadcast traffic through a routerC、to filter traffic as it passes through a routerD、to filter traffic that originates from the routerE、to replace passwords as a line of defense against security incursions

考题 In the Junos OS, what handles transit traffic?()A、Transit traffic is handled by the RE onlyB、Transit traffic is handled by the PFE onlyC、Transit traffic is handled by both the RE and the PFED、Transit traffic is not handled by the RE or the PFE

考题 调度集中 centralized traffic control(CTC)

考题 Which statement about an IPS is true?()A、The IPS is in the traffic path.B、Only one active interface is required.C、Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D、When malicious traffic is detected,the IPS will only send an alert to a management station.

考题 How will the above access lists affect traffic?()A、FTP traffic from 192.169.1.22 will be deniedB、No traffic, except for FTP traffic will be allowed to exit E0C、FTP traffic from 192.169.1.9 to any host will be deniedD、All traffic exiting E0 will be deniedE、All FTP traffic to network 192.169.1.9/29 will be denied

考题 Which zone type will allow transit-traffic?()A、systemB、securityC、defaultD、functional

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 单选题Which statement about an IPS is true?()A The IPS is in the traffic path.B Only one active interface is required.C Full benefit of an IPS will not be realized unless deployed in conjunction with an IDS.D When malicious traffic is detected,the IPS will only send an alert to a management station.

考题 单选题Which statement is true about the comparison of voice traffic with video traffic?()A  Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B  Latency requirements are less stringent for video traffic than for voice traffic.C  Video traffic is less sensitive to dropped packets than for voice traffic.D  Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E  Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F  Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

考题 单选题What is the difference between the Ethanalyzer and the SPAN feature in Cisco NX-OS?()A  The Ethanalyzer captures control-plane traffic, while SPAN captures all traffic.B  The Ethanalyzer captures all traffic including control-plane traffic, while SPAN captures only the control-plane traffic.C  The Ethanalyzer captures only data traffic, while SPAN captures all traffic.D  The Ethanalyzer captures only control traffic, while SPAN captures data traffic.

考题 单选题Given the configuration shown in the exhibit, what will happen to traffic from source 10.10.10.25 destined to 200.200.200.1?()A The traffic will be rejectedB The traffic will be droppedC The traffic will be forwardedD The traffic will be policed

考题 单选题() is not likely to be a methods of Traffic Separation.A Separation of opposing streams of traffic by separation zones or linesB The separation of through traffic from local traffic by provision of inshore traffic zonesC Division of traffic from several different direction into sectorsD Control of routing traffic through shipping routes

考题 多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

考题 多选题Which statement is true about the comparison of voice traffic with video traffic?()Avideo conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsBlatency requirements are less stringent for video traffic than for voice trafficCvideo traffic is less sensitive to dropped packets than for voice trafficDvideo traffic requires the retransmission capabilities of TCP whereas voice uses UDPEvideo traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsFvoice traffic requires the retransmission capabilities of TCP whereas video uses UDP