网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?()
A

after a packet is identified by a multifield classifier

B

after the traffic passes though a shaper

C

prior to ingress policing of traffic

D

while the packet is stored in the switching fabric of the router


参考答案

参考解析
解析: 暂无解析
更多 “单选题When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?()A after a packet is identified by a multifield classifierB after the traffic passes though a shaperC prior to ingress policing of trafficD while the packet is stored in the switching fabric of the router” 相关考题
考题 Which statement describes the PFE?() A. The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tablesB. The PFE implements advanced services such as policing, stateless firewall filtering, and class of serviceC. The PFE sends traffic to the RE for systematic packet forwardingD. The PFE receives hardware and environmental status messages from the RE

考题 When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?() A.after a packet is identified by a multifield classifierB.after the traffic passes though a shaperC.prior to ingress policing of trafficD.while the packet is stored in the switching fabric of the router

考题 What is the first CoS process performed when a packet enters a JUNOS device?() A.Rewrite MarkerB.Multifield ClassifierC.PolicingD.BA Classifier

考题 What is the last CoS process performed prior to a packet leaving a router?() A.Rewrite MarkerB.Multifield ClassifierC.PolicingD.BA Classifier

考题 What is the proper order for CoS processing for ingress packets on a Juniper router?() A.Multifield Classifier Forwarding Policy Policing BA ClassifierB.Multifield Classifier Policing BA Classifier Forwarding PolicyC.BA Classifier Policing Multifield Classifier Forwarding PolicyD.BA Classifier Forwarding Policy Policing Multifield Classifier

考题 When are packets processed in an inbound access list?() A. Before they are routed to an outbound interface.B. After they are routed for outbound traffic.C. After they are routed to an outbound interface while queuing.D. Before and after they are routed to an outbound interface.E. Depends on the configuration of the interfaceF. None of the above

考题 Users at the Charleville Company began experiencing high network delays when Internet connectivity was enabled for all users. After investigating the traffic flow, you determine that peerto-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoS mechanism can you implement to improve the network response time?()A. Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B. Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions.C. Use class-based policing to limit the peer-to-peer traffic rate.D. Use class-based shaping to delay any excessive peer-to-peer traffic. Answer: C

考题 Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 Which statement describes the PFE?()A、The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tablesB、The PFE implements advanced services such as policing, stateless firewall filtering, and class of serviceC、The PFE sends traffic to the RE for systematic packet forwardingD、The PFE receives hardware and environmental status messages from the RE

考题 Which two statements describe the difference between JUNOS Software for securityplatforms and a traditional router?()A、JUNOS Software for security platforms supports NAT and PAT; a traditional router does not support NAT or PAT.B、JUNOS Software for security platforms does not forward traffic by default; a traditional router forwards traffic by default.C、JUNOS Software for security platforms uses session-based forwarding; a traditional router uses packet-based forwarding.D、JUNOS Software for security platforms performs route lookup for every packet; a traditional router performs route lookup only for the first packet.

考题 What is the proper order for CoS processing for ingress packets on a Juniper router?()A、Multifield Classifier Forwarding Policy Policing BA ClassifierB、Multifield Classifier Policing BA Classifier Forwarding PolicyC、BA Classifier Policing Multifield Classifier Forwarding PolicyD、BA Classifier Forwarding Policy Policing Multifield Classifier

考题 When are packets processed in an inbound access list?()A、Before they are routed to an outbound interface.B、After they are routed for outbound traffic.C、After they are routed to an outbound interface while queuing.D、Before and after they are routed to an outbound interface.E、Depends on the configuration of the interfaceF、None of the above

考题 Which statement describes exception traffic?()A、Exception traffic must be sent to the PFE for processing.B、Exception traffic enters one ingress port and is sent out multiple egress ports.C、Exception traffic is rate-limited on the internal link to prevent DoS attacks.D、Exception traffic is processed after forwarding traffic when congestion exists.

考题 What is the first CoS process performed when a packet enters a JUNOS device?()A、Rewrite MarkerB、Multifield ClassifierC、PolicingD、BA Classifier

考题 When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?()A、after a packet is identified by a multifield classifierB、after the traffic passes though a shaperC、prior to ingress policing of trafficD、while the packet is stored in the switching fabric of the router

考题 When does the E-series router start monitoring DHCP traffic using the DHCP External function?()A、When the discovery packet enters the router from the DHCP client.B、Only when the offer packet enters the router from the DHCP server.C、When the acknowledge packet enters the router from the DHCP server.D、Only when the discovery packet leaves the router going to the DHCP server.

考题 What is the last CoS process performed prior to a packet leaving a router?()A、Rewrite MarkerB、Multifield ClassifierC、PolicingD、BA Classifier

考题 多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 单选题Which statement describes the PFE?()A The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tablesB The PFE implements advanced services such as policing, stateless firewall filtering, and class of serviceC The PFE sends traffic to the RE for systematic packet forwardingD The PFE receives hardware and environmental status messages from the RE

考题 单选题What is the default Quality of Service traffic class used by the ERX Edge Router?()A bronze forwardingB assured forwardingC expedited forwardingD best effort forwarding

考题 单选题Which statement describes exception traffic?()A Exception traffic must be sent to the PFE for processing.B Exception traffic enters one ingress port and is sent out multiple egress ports.C Exception traffic is rate-limited on the internal link to prevent DoS attacks.D Exception traffic is processed after forwarding traffic when congestion exists.

考题 多选题Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()AControl Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.BControl Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.CControl Plane Policing (CoPP) uses a dedicated control-plane command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.DControl Plane Policing (CoPP) uses service policy command under relevant interfaces to filter DOS packet to protect routing packets.EControl Plane Policing (CoPP) protects the transit management and data traffic through the router.

考题 单选题When is the BA Classifier engaged for identifying the forwarding class of traffic in a Juniper router?()A after a packet is identified by a multifield classifierB after the traffic passes though a shaperC prior to ingress policing of trafficD while the packet is stored in the switching fabric of the router

考题 单选题Users at the Charleville Company began experiencing high network delays when Internetconnectivity was enabled for all users. After investigating the traffic flow, you determine that peer-to-peer traffic from a music download site is consuming a large amount of bandwidth. Which QoSmechanism can you implement to improve the network response time?()A  Use CBWFQ to queue the peer-to-peer traffic into the default traffic class.B  Use class-based WRED to randomly drop the peer-to-peer traffic during network congestions. C  Use class-based policing to limit the peer-to-peer traffic rate.D  Use class-based shaping to delay any excessive peer-to-peer traffic.

考题 单选题What is the proper order for CoS processing for ingress packets on a Juniper router?()A Multifield Classifier Forwarding Policy Policing BA ClassifierB Multifield Classifier Policing BA Classifier Forwarding PolicyC BA Classifier Policing Multifield Classifier Forwarding PolicyD BA Classifier Forwarding Policy Policing Multifield Classifier

考题 单选题What are the contents of a scheduler?()A A scheduler contains parameters that describe how a queue should be serviced.B A scheduler contains traffic that is ready to be transmitted.C A scheduler contains forwarding classes that allow traffic to be forwarded.D A scheduler contains a map between the classification of a packet and its forwarding class.