网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()

A. ICMP Echo

B. VoIP (RTP)

C. IPX

D. SNMP


参考答案

更多 “ Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?() A. ICMP EchoB. VoIP (RTP)C. IPXD. SNMP ” 相关考题
考题 Which of the following is the BEST support channel for server software and hardware?() A. Online troubleshooting toolsB. Service Level Agreement (SLA)C. Vendor websiteD. Support forums

考题 A service level agreement is an agreement between two or more parties, where one is the customer and the others are ( ). A. service brokers B. service providers C. service auditors D. key customers

考题 The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()A、control plane policingB、data plane policingC、network-based application recognition (NBAR)D、service plane policingE、management plane policing

考题 Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library

考题 Which three statements accurately describe IOS Firewall configurations?()A、The IP inspection rule can be applied in the inbound direction on the secured interfaceB、The IP inspection rule can be applied in the outbound direction on the unsecured interfaceC、The ACL applied in the inbound direction on the unsecured interface should be an extendedACL.D、For temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

考题 Which three of these statements about the IP service level agreement (SLA) sender are true? ()A、SLA sender target can be an IP hostB、SLA sender sends a probe packet and a response probe packetC、SLA sender sends a probe packetD、SLA sender target must be a routerE、SLA sender target can be an IP SLA responder

考题 Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)

考题 Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()A、It can be used to block bulk encryption attacksB、It can be used to protect against denial of service attacksC、Traffic originating from the router is considered trusted, so it is not inspectedD、Based upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyE、Temporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

考题 How can Cisco NetFlow be used to aid in the operation and troubleshooting of QoS issues? ()A、NetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.B、NetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.C、NetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.D、NetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.

考题 Which of the following is the MOST important consideration before making a change to a server?()A、Explore the ramification of the change before implementation.B、Determine the service level agreement in place before implementation.C、Review the equipment disposal procedures and policies before implementation.D、Notify all staff members of the planned system outage before implementation.

考题 Which of the following is the BEST support channel for server software and hardware?()A、Online troubleshooting toolsB、Service Level Agreement (SLA)C、Vendor websiteD、Support forums

考题 Which of the following can transmit block level storage over Ethernet?()A、SASB、iSCSIC、USBD、SATA

考题 A two-node cluster has both a single TCP/IP heartbeat and a single non-IP serial heartbeat. TheService Level Agreement regarding the speed of cluster fallover has been updated,and Fast Disk Takeover will be implemented to meet the new Service Level Agreement.  Which of the following should be implemented to increase the reliability of Fast Disk Takeover?()  A、 Disk should be mirrored across separate storage enclosures.B、 Disk heartbeats should be added over multiple disk adapters.C、 Disk major and minor numbers should be set as unique across nodes.D、 Disk adapter queue_depth should be increased from the default values.

考题 john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A、 readerB、 authorC、 managerD、 designer

考题 单选题Which of the following is the MOST important consideration before making a change to a server?()A  Explore the ramification of the change before implementation.B  Determine the service level agreement in place before implementation.C  Review the equipment disposal procedures and policies before implementation.D  Notify all staff members of the planned system outage before implementation.

考题 单选题Which of the following is the BEST support channel for server software and hardware?()A Online troubleshooting toolsB Service Level Agreement (SLA)C Vendor websiteD Support forums

考题 单选题john has created a database library, librarians are responsible for adding new information to the db library. which one of the following minimum level of access he can grant the librarians of the db library?()A  readerB  authorC  managerD  designer

考题 多选题Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()AICMP EchoBVoIP (RTP)CIPXDSNMP

考题 单选题A trigger can be created on which of the following objects?()A ViewB Catalog TableC Stored ProcedureD Global Temporary Table

考题 单选题The route processor is critical to the operation of a network, and any service disruption to the route processor can result in network outages. Which QoS tool canprotectroute processor traffic?()A control plane policingB data plane policingC network-based application recognition (NBAR)D service plane policingE management plane policing

考题 多选题Which three of these statements about the IP service level agreement (SLA) sender are true? ()ASLA sender target can be an IP hostBSLA sender sends a probe packet and a response probe packetCSLA sender sends a probe packetDSLA sender target must be a routerESLA sender target can be an IP SLA responder

考题 单选题A two-node cluster has both a single TCP/IP heartbeat and a single non-IP serial heartbeat. TheService Level Agreement regarding the speed of cluster fallover has been updated,and Fast Disk Takeover will be implemented to meet the new Service Level Agreement.  Which of the following should be implemented to increase the reliability of Fast Disk Takeover?()A  Disk should be mirrored across separate storage enclosures.B  Disk heartbeats should be added over multiple disk adapters.C  Disk major and minor numbers should be set as unique across nodes.D  Disk adapter queue_depth should be increased from the default values.

考题 多选题Which four statements about an IP service level agreement (SLA) are true? ()ASLA responder knows type of operation, the port used, and duration.BSLA responder inserts in and out timestamps in the packet payload.CSLA sender and responder use the IP SLA Control Protocol to communicate with each other beforeDSLA sender and responder communication can be encrypted.ESLA sender and responder communication can be authenticated with MD5.

考题 多选题Which two statements are true about the Cisco Classic (CBAC) IOS Firewall set?()AIt can be used to block bulk encryption attacksBIt can be used to protect against denial of service attacksCTraffic originating from the router is considered trusted, so it is not inspectedDBased upon the custom firewall rules, an ACL entry is statically created and added to theexisting ACL permanentlyETemporary ACL entries that allow selected traffic to pass are created and persist for theduration of the communication session

考题 单选题Which of the following regulates the amount of network traffic a single node receives in a servercluster?()A Load balancerB Proxy serverC Content filterD Quality of service

考题 多选题Which three statements accurately describe IOS Firewall configurations?()AThe IP inspection rule can be applied in the inbound direction on the secured interfaceBThe IP inspection rule can be applied in the outbound direction on the unsecured interfaceCThe ACL applied in the inbound direction on the unsecured interface should be an extendedACL.DFor temporary openings to be created dynamically by Cisco IOS Firewall, the access-list for thereturning traffic must be a standard ACL

考题 单选题Which of the following is the BEST support channel for server software and hardware?()A  Online troubleshooting toolsB  Service Level Agreement (SLA)C  Vendor websiteD  Support forums