网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Which statement describes transit traffic?()

  • A、Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.
  • B、Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.
  • C、Any traffic that requires the generation of an ICMP message.
  • D、Traffic that requires some form of special attention and does not pass through the device.

参考答案

更多 “Which statement describes transit traffic?()A、Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B、Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C、Any traffic that requires the generation of an ICMP message.D、Traffic that requires some form of special attention and does not pass through the device.” 相关考题
考题 Which statement is correct regarding exception traffic processing?() A. Exception traffic is only handled by the PFEB. Exception traffic is rate-limited across the internal link to protect the REC. Exception traffic is not prioritized during times of congestionD. Exception traffic is forwarded based on forwarding table entries

考题 Which statement describes transit traffic?() A. Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B. Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C. Any traffic that requires the generation of an ICMP message.D. Traffic that requires some form of special attention and does not pass through the device.

考题 In the Junos OS, what handles transit traffic?() A. Transit traffic is handled by the RE onlyB. Transit traffic is handled by the PFE onlyC. Transit traffic is handled by both the RE and the PFED. Transit traffic is not handled by the RE or the PFE

考题 How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?() A. It sends the traffic through one egress port toward its destinationB. It sends the traffic through multiple egress ports to all available receiversC. It sends the traffic through an internal link to the RED. It sends the traffic to the local system for further processing

考题 Which statement describes the PFE?() A. The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tablesB. The PFE implements advanced services such as policing, stateless firewall filtering, and class of serviceC. The PFE sends traffic to the RE for systematic packet forwardingD. The PFE receives hardware and environmental status messages from the RE

考题 Which statement about IDS/IPS design is correct?() A. An IPS should be deployed if the security policy does not support the denial of traffic.B. An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C. An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D. Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

考题 Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

考题 On the Cisco Nexus 7000 Series Switch, Control Plane Policing is enforced on which component?()A、 The supervisor module enforces CoPP before out-of-policy traffic reaches the CPUB、 The fabric modules enforce CoPP in the fabric before out-of-policy traffic reaches the CPU C、 The linecards enforce CoPP locally before out-of-policy traffic reaches the CPUD、 The egress virtual output queue enforces CoPP locally before out-of-policy traffic reaches the CPU

考题 Which statement describes the PFE?()A、The PFE controls the RE by providing Layer 2 and Layer 3 forwarding tablesB、The PFE implements advanced services such as policing, stateless firewall filtering, and class of serviceC、The PFE sends traffic to the RE for systematic packet forwardingD、The PFE receives hardware and environmental status messages from the RE

考题 How does the PFE handle unicast transit traffic destined for an existing forwarding table entry?()A、It sends the traffic through one egress port toward its destinationB、It sends the traffic through multiple egress ports to all available receiversC、It sends the traffic through an internal link to the RED、It sends the traffic to the local system for further processing

考题 Which statement is correct regarding exception traffic processing?()A、Exception traffic is only handled by the PFEB、Exception traffic is rate-limited across the internal link to protect the REC、Exception traffic is not prioritized during times of congestionD、Exception traffic is forwarded based on forwarding table entries

考题 Which statement describes the behavior of a security policy?()A、The implicit default security policy permits all traffic.B、Traffic destined to the device itself always requires a security policy.C、Traffic destined to the device’s incoming interface does not require a security policy.D、The factory-default configuration permits all traffic from all interfaces.

考题 In the Junos OS, what handles transit traffic?()A、Transit traffic is handled by the RE onlyB、Transit traffic is handled by the PFE onlyC、Transit traffic is handled by both the RE and the PFED、Transit traffic is not handled by the RE or the PFE

考题 Which four statements about NetFlow are true?()A、NetFlow records bidirectional IP traffic flow.B、NetFlow export can be implemented over IPv4.C、NetFlow export can be implemented over IPv6.D、NetFlow records multicast IP traffic flow.E、NetFlow records ingress traffic.F、NetFlow records egress traffic.

考题 What statement about Transit AS is true?()A、Traffic and prefixes originating from Source AS are carried across a Transit AS to reach theirdestination ASB、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their destination ASC、Traffic and prefixes originating from Transit AS are carried across a Stub AS to their Source ASD、None of the above

考题 A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()A、Remark the traffic on ingress and prioritize on egress.B、Enable CEF and Netflow. C、Configure the MS-Windows QoS Scheduler to prioritize this traffic.D、Enable WRED.

考题 Which statement describes exception traffic?()A、Exception traffic must be sent to the PFE for processing.B、Exception traffic enters one ingress port and is sent out multiple egress ports.C、Exception traffic is rate-limited on the internal link to prevent DoS attacks.D、Exception traffic is processed after forwarding traffic when congestion exists.

考题 What are two functions associated with JUNOS software class of service?()A、Log incoming traffic.B、Manage ingress bandwidth.C、Mark packets for special handling.D、Manage congestion by intelligently dropping traffic.E、Classify Frame Relay QoS packets into an equivalent OP CoS environment.

考题 多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 多选题Which four statements about NetFlow are true?()ANetFlow records bidirectional IP traffic flow.BNetFlow export can be implemented over IPv4.CNetFlow export can be implemented over IPv6.DNetFlow records multicast IP traffic flow.ENetFlow records ingress traffic.FNetFlow records egress traffic.

考题 多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

考题 多选题Which statement is true about the comparison of voice traffic with video traffic?()Avideo conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsBlatency requirements are less stringent for video traffic than for voice trafficCvideo traffic is less sensitive to dropped packets than for voice trafficDvideo traffic requires the retransmission capabilities of TCP whereas voice uses UDPEvideo traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flowsFvoice traffic requires the retransmission capabilities of TCP whereas video uses UDP

考题 单选题Which statement about IDS/IPS design is correct?()A  An IPS should be deployed if the security policy does not support the denial of traffic.B  An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C  An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D  Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

考题 单选题Which statement about IDS/IPS design is correct?()A An IPS should be deployed if the security policy does not support the denial of traffic.B An IPS analyzes a copy of the monitored traffic and not the actual forwarded packet.C An IDS analyzes a copy of the monitored traffic and not the actual forwarded packet.D Bandwidth considerations must be taken into account since IDS is deployed inline to traffic flow.

考题 单选题Which statement describes transit traffic?()A Traffic addressed to the chassis that requires some form of special handling by the RE before it can be forwarded out an egress port.B Traffic that enters an ingress port, is compared against the forwarding table, and is forwarded out an egress port.C Any traffic that requires the generation of an ICMP message.D Traffic that requires some form of special attention and does not pass through the device.

考题 单选题In the Junos OS, what handles transit traffic?()A Transit traffic is handled by the RE onlyB Transit traffic is handled by the PFE onlyC Transit traffic is handled by both the RE and the PFED Transit traffic is not handled by the RE or the PFE