网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
多选题
Which two QoS classification and marking statements are true? ()
A

In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.

B

In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.

C

In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.

D

The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.

E

The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.


参考答案

参考解析
解析: 暂无解析
更多 “多选题Which two QoS classification and marking statements are true? ()AIn a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.BIn an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.CIn an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.DThe differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.EThe 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.” 相关考题
考题 Which two Cisco AutoQoS configuration statements are true? ()A、the auto discovery qos command is supported on serial interfaces, subinterfaces, and virtual interfacesB、CEF must be enabled before configuring the auto discovery qos commandC、the auto discovery qos privilege EXEC command must be configured on a router for several days to collect a sampling of data trafficD、the auto qos trust command relies on NBAR to provide VoIP classificationE、the auto qos voip command configures the voip classification on routers and switches

考题 Which two statements or sets of statements are true about the application of the qos pre-classify command?()A、 If the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS byte only appears in the inner IP header.B、 The ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary.C、 With GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different OoS configurations on each tunnel.D、 With GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.E、 With IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.

考题 Which two QoS classification and marking statements are true? ()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP field.C、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.1Q standard uses a three bit field referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

考题 Which two QoS classification and marking statements are true?()A、 In a Frame Relay network, delay sensitive traffic is tagged with the discard eligible (DE) bit.B、 In an MPLS network, the three most significant bits of the DSCP or the IP precedence of the IP packet are copied into the MPLS EXP fieldC、 In an MPLS network, the MPLS EXP bits are used to identify up to 16 CoS values.D、 The differentiated services code point (DSCP) field consists of the first three bits of the IP precedence field in the header of an IP packet.E、 The 802.10 standard uses a three bitfield referred to as the user priority bits (PRI) to mark packets as belonging to a specific CoS.

考题 Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()A、It is used in multihome network scenarios.B、It can be used with BGP to mitigate DoS and DDoS.C、It does not need to have CEF enabled.D、It is enabled via the interface level command ip verify unicast reverse-path.E、It cannot be used with "classification" access lists.

考题 Which two statements are true about L2TP tunnels?() (Choose two.)A、Traffic is clear textB、Traffic is encryptedC、They are initiated by the LNSD、They are initiated by the LAC

考题 Which two statements about the best effort model for QoS are true?()A、delay sensitive packets are given preferential treatmentB、the default policy identifies a delay sensitive class and default classC、the default policy identifies a delay sensitive class, best effort class, and default classD、the model is highly scalableE、the model is still predominant on the internet F the model provides guaranteed service

考题 Which two statements are true about traffic shaping?()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking/remarking is not supported.D、It does not respond to BECN and ForeSight Messages.E、It uses a single/two-bucket mechanism for metering.

考题 Which three statements are true about policing? ()A、Out-of-profile packets are queued.B、It causes TCP retransmits.C、Marking and remarking are not supported.D、It does not respond to BECN and foresight messages.E、It uses a single- and two-bucket mechanism for metering.

考题 Which two statements about the QoS policy generation phase of the Cisco SDM QoS wizard are true?()A、the SDM QoS wizard will create two real-time traffic classes to handle VoIP, voice signaling, and video packetsB、the SDM QoS wizard will create three real-time traffic classes to handle VoIP, voice signaling, video, and video packetsC、the SDM QoS wizard will create four real-time traffic classes to handle VoIP, voice signaling, video, and video streaming packetsD、the SDM QoS wizard will create two business-critical traffic classes to handle transactional and  network management packetsE、the SDM QoS wizard will create three business-critical traffic classes to handle transactional, network management, and routing packetsF、the SDM QoS wizard will create four business-critical traffic classes to handle transactional, network management, routing, and best-effort packets

考题 Which two statements are true about trust boundaries?()A、Classifying and marking traffic should be done as close to the traffic source as possible. B、Classifying and marking traffic should be done at the distribution layer.C、Traffic is classified and marked as it travels through the network.D、If untrusted traffic enters a switch, it can be marked with a new QoS value appropriate for the policy in place.E、The trust boundary moves depending on the type of traffic entering the network.

考题 Which two statements about the DiffServ QoS model are true?()A、DiffServ requires RSVP to set up a path through the network to accommodate the requested QoS.B、Network traffic is identified by class, and the level of service is chosen for each class.C、The DiffServ model relies on a fairly simple mechanism to provide QoS over a wide range of equipment.D、RSVP enables the DiffServ model to provide end-to-end QoS.E、The DiffServ model is more scalable than the IntServ model.F、The flow-based approach of the DiffServ model is ideal for large scalable implementations such as the public Internet.

考题 You need to determine where the trust boundaries will be in a new Company VOIP design.  Which  two statements are true about these trust boundaries?()A、Trust boundaries are configured in the core of the network to provide the most efficient  forwarding based upon QoS markings,B、Setting trust boundaries at the edge of the network allows intermediate hop devices to  administer QoS policies without detailed packet identification.C、Trust boundaries are used to determine which QoS mechanism will be applied to the traffic.  D、At the trust boundaries, the untrusted traffic will be marked with a new QoS value appropriate  for the policy in place at the point where the traffic entered the campus network.  E、Trust boundaries define the firewall rules for QoS admission into a network.

考题 Which QoS mechanisms can you use on a converged network to improve VoIP quality?()A、The use of a queuing method that will give VoIP traffic strict priority over other trafficB、The use of RTP header compression for the VoIP trafficC、The proper classification and marking of the traffic as close to the source as possibleD、The use of 802.1QinQ trunking for VoIP trafficE、The use of WRED

考题 Which two statements about the QoS functionality of the Cisco SDM are true?()A、the first step when using the SDM QoS wizard is to select the inbound interface on which the QoS policy must be appliedB、the SDM QoS wizard can be used to optimize LAN, WAN, and VPN interfacesC、he SDM QoS wizard supports network-based application recognition (NBAR) to provide deep and stateful packet inspectionD、he SDM QoS wizard will apply custom queuing and priority queuing policies to the identified interfacesE、he SDM QoS wizard will apply low latency-queuing,custom-queuing and priority-queuing policies to the identified interfacesF、to create and manage the QoS settings, the user must select the QoS wizard task under the Monitor option

考题 Which two statements are true about the implementation of QoS? ()A、 Implementing DiffServ involves the configuration of RSVP.B、 Implementing IntServ allows QoS to be performed by configuring only the ingress and egress devices.C、 Implementing IntServ involves the utilization of RSVP.D、 Traffic should be classified and marked by the core network devices.E、 Traffic should be classified and marked as close to the edge of the network as possible.

考题 Which of the following statements are true?() A、 The equals() method determines if reference values refer to the same object.B、 The == operator determines if the contents and type of two separate objects match.C、 The equals() method returns true only when the contents of two objects match.D、 The class File overrides equals() to return true if the contents and type of two separate objects match.

考题 Which two statements are true regarding L2TP? ()(Choose two.)A、Tunnels are initiated by the LACB、Tunnels are initiated by the LNSC、By default, subscriber authentication occurs on the LNSD、By default, subscriber authentication occurs on the LAC

考题 多选题Which two Cisco AutoQoS configuration statements are true? ()Athe auto discovery qos command is supported on serial interfaces, subinterfaces, and virtual interfacesBCEF must be enabled before configuring the auto discovery qos commandCthe auto discovery qos privilege EXEC command must be configured on a router for several days to collect a sampling of data trafficDthe auto qos trust command relies on NBAR to provide VoIP classificationEthe auto qos voip command configures the voip classification on routers and switches

考题 多选题Which two statements are true about L2TP tunnels?() (Choose two.)ATraffic is clear textBTraffic is encryptedCThey are initiated by the LNSDThey are initiated by the LAC

考题 多选题Which QoS mechanisms can you use on a converged network to improve VoIP quality?()AThe use of a queuing method that will give VoIP traffic strict priority over other trafficBThe use of RTP header compression for the VoIP trafficCThe proper classification and marking of the traffic as close to the source as possibleDThe use of 802.1QinQ trunking for VoIP trafficEThe use of WRED

考题 多选题Refer to the exhibit. Which three statements are true about trust boundaries in the campus network?  (Choose three.)()AA device is trusted if it correctly classifies packets.BA device is trusted if it correctly declassifies packets.CThe outermost trusted devices represent the trust boundary.DClassification and marking occur using 802.1ab QoS bits before reaching the trust boundary.ENetwork trust boundaries are automatically configured in IOS version 12.3 and later.FFor scalability, classification should be done as close to the edge as possible.

考题 多选题Which two statements are true about the various methods of implementing QoS?()ACisco AutoQoS can be used repeatedly to apply a single QoS policy to multiple interfaces.BCisco AutoQoS includes an optional web-based GUI for automating the configuration of QoS services.CCisco AutoQoS provides capabilities to automate VoIP deployments.DThe auto qos global configuration command is used to configure Cisco AutoQoS.EThe Modular QoS CLI (MQC) is the best way to fine tune QoS configurations.FThe SDM QoS wizard is the fastest way to implement QoS.

考题 多选题Which two statements about the best effort model for QoS are true?()Adelay sensitive packets are given preferential treatmentBthe default policy identifies a delay sensitive class and default classCthe default policy identifies a delay sensitive class, best effort class, and default classDthe model is highly scalableEthe model is still predominant on the internet F the model provides guaranteed service

考题 多选题Which two statements or sets of statements are true about the application of the qos pre-classify command?()AIf the classification policy is based upon the ToS byte, the qos pre-classify command is required because the ToS byte only appears in the inner IP header.BThe ToS byte is copied to the outer header by default. Therefore, the qos pre-classify command is not necessary.CWith GRE encapsulation, the qos pre-classify command is applied on the tunnel interface. This practice allows for different OoS configurations on each tunnel.DWith GRE encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.EWith IPsec encapsulation, the qos pre-classify command is applied on the physical interface. This practice allows for different OoS configurations on each interface.

考题 多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

考题 多选题Which two statements are true about Unicast Reverse Path Forwarding Loose Mode?()AIt is used in multihome network scenarios.BIt can be used with BGP to mitigate DoS and DDoS.CIt does not need to have CEF enabled.DIt is enabled via the interface level command ip verify unicast reverse-path.EIt cannot be used with classification access lists.