网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)

Random early detection (RED) is associated with which class of service component?()

  • A、classification
  • B、policing
  • C、queuing
  • D、scheduling

参考答案

更多 “Random early detection (RED) is associated with which class of service component?()A、classificationB、policingC、queuingD、scheduling” 相关考题
考题 Which three ports does a WX device use for control traffic purposes?() (Choose three.)A、3577 UDPB、3578 UDPC、3678 UDPD、3577 TCPE、3578 TCP

考题 What information is used by a switch to forward an Ethernet frame to its destination?()A、IP addressB、destination MAC addressC、ARP table entryD、FCS checksum

考题 Given the community: community my-company members "^[1-3]*7:666$"; Which three communitiesdoes this expression match?()A、17:666B、17:667C、27:666D、37:666E、47:666

考题 If all OSPF routers on a broadcast network have the same OSPF priority, what parameter is used to determine the new BDR at the time of a DR failure?()A、 area IDB、 router IDC、 loopback addressD、 IP address of interface on broadcast network

考题 What is the default export routing policy for EBGP?()A、Accept all active BGP routesB、Accept all BGP routesC、Accept no routesD、Accept all active IGP routes

考题 Which two environments would take advantage of TCP Acceleration (AFP)? ()(Choose two.)A、satellite networksB、low-latency networksC、long-haul link with 95% compressibility.D、long-haul link with 10% compressibility.

考题 What are three configuration objects used to build JUNOS IDP rules?()A、zone objectsB、policy objectsC、attack objectsD、alert and notify objectsE、network and address objects

考题 Which three BGP states follow the successful completion of the underlying TCP connectivity? ()(Choose three.)A、IdleB、ConnectC、Open SentD、EstablishedE、Open Confirm

考题 When using a 40 Gbps switch fabric,how much full duplex bandwidth is available to each slot?()A、1.25GbpsB、1.65GbpsC、2.55GbpsD、5.00Gbps

考题 You have a firewall enforcer receiving resource access policies from a Junos Pulse Access Control Service. You are using Network and Security Manager (NSM) for configuration management on that firewall. The firewall can also be configured using its built-in command-line interface (CLI) or Web-based user interface (WebUI). To avoid conflicting configurations, which two interfaces must you use to configure the firewall enforcer?()A、CLIB、WebUIC、NSMD、Junos Pulse Access Control Service