网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()
A

Remark the traffic on ingress and prioritize on egress.

B

Enable CEF and Netflow. 

C

Configure the MS-Windows QoS Scheduler to prioritize this traffic.

D

Enable WRED.


参考答案

参考解析
解析: 暂无解析
更多 “单选题A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()A Remark the traffic on ingress and prioritize on egress.B Enable CEF and Netflow. C Configure the MS-Windows QoS Scheduler to prioritize this traffic.D Enable WRED.” 相关考题
考题 You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS

考题 You are working with CIS .com. who has identified the following IP applications on their network: IP voice and voice signaling, streaming video, PeopleSoft, Microsoft SQL, e-mail, and Internet traffic.If the voice traffic was classified as EF and AF31, the e-mail was classified as AF11, and the Internet traffic was classified as DSCP 0, how would the transactional traffic represented as PeopleSoft and Microsoft SQL be classified?()A. DSCP AF21B. DSCP CS4C. DSCP AF33D. DSCP AF13

考题 The router SIS-R has been configured in a CIS network. As a network administrator, you were required to enable MPLS on that router.Which of the following description is making sense on the basis of the output information?()A. CEF switching is only needed to forward labeled packets.B. CEF switching is needed on both ingress and egress interfaces on which MPLS is enabled.C. Interface-level CEF switching is needed only on egress interfaces that are sending IP packets on which the egress LSR performs the label imposition process.D. Interface-level CEF switching is needed only on ingress interfaces that are receiving IP packets on which the ingress LSR performs the label imposition process.

考题 Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 Which two QoS statements are true about the use of the SDM QoS wizard?()A、Business-critical traffic includes VoIP and voice signaling packets.B、SDM can be used to configure a basic QoS policy for incoming traffic on WAN interfaces and IPsec tunnels.C、SDM can provide QoS for real-time traffic and business-critical traffic.D、SDM creates a custom-queuing (CQ) or a priority-queuing (PQ) policy.E、SDM creates a low latency queuing (LLQ) service policy with its associated classes.F、When allocating bandwidth, values can be entered in either bandwidth percentage or kilobytes per second (kBps).

考题 You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()A、The access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is "trusted" that it isentering the network with the appropriate tagB、No traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreC、Traffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsD、IP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offE、MAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerF、The distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

考题 You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()A、data marked with DSCP AF21,VOIP marked with DSCP EFB、data marked with DSCP AF51,VOIP marked with DSCP EFC、data marked with the DE-bit,VOIP marked with the CLP-bitD、data marked with DSCP EF,VOIP marked with DSCP AF31E、data marked with IP precedence 5 VOIP marked with DSCP EF

考题 Which statement best describes the application of link fragmentation and interleaving (LFI)?()A、It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstB、It fragments larger packets and allows VoIP packets to be transmitted in between them.C、It stops the transmission of large packets when priority packets arrive.D、It sends high priority packets in between normal traffic packets.

考题 In which two ways can you influence how downstream LSRs treat MPLS traffic?()A、Use an EXP rewrite table.B、Use a DSCP rewrite table.C、Statically assign a CoS value to an LDP-signaled LSPD、Statically assign a CoS value to an RSVP-signlated LSP

考题 You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

考题 A customer indicates they run a mission-critical application which marks its packets best-effort (DSCP=0). How can you guarantee delivery of this traffic?()A、Remark the traffic on ingress and prioritize on egress.B、Enable CEF and Netflow. C、Configure the MS-Windows QoS Scheduler to prioritize this traffic.D、Enable WRED.

考题 Which of the following is the purpose of QoS?()A、Load balance traffic across multiple LAN and WAN links.B、Increase speed of network traffic.C、Classify, mark, and prioritize traffic on WAN and LAN linksD、Guarantee traffic delivery.

考题 An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking

考题 In which two ways can you influence how downstream LSRs treat MPLS traffic?()A、Use an EXP rewrite table.B、Use a DSCP rewrite table.C、Statically assign a CoS value to an LDP-signaled LSP.D、Statically assign a CoS value to an RSVP-signaled LSP.

考题 Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A、the log option for the particular SCREEN optionB、the permit option for the particular SCREEN optionC、the SCREEN option, because it does not drop traffic by defaultD、the alarm-without-drop option for the particular SCREEN option

考题 单选题Which of the following is the purpose of QoS?()A Load balance traffic across multiple LAN and WAN links.B Increase speed of network traffic.C Classify, mark, and prioritize traffic on WAN and LAN linksD Guarantee traffic delivery.

考题 多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

考题 单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons.  Which of the following techniques can be used to manage this?()A  PATB  ACLsC  Subnet maskingD  Port blocking

考题 多选题You work as a network technician. Your boss is interested in the QoS technology in the context ofvideo traffic. What can be said of application of this technology in this type of network?()AThe access layer is the initial point at which traffic enters the network. Traffic is marked (orremarked) at Layers 2 and 3 by the access switch as it enters the network, or is trusted that it isentering the network with the appropriate tagBNo traffic marking occurs at the core layer. Layer 2/3 QoS tags are trusted from distributionlayer switches and used to prioritize and queue the traffic as it traverses the coreCTraffic inbound from the access layer to the distribution layer can be trusted or reset dependingupon the ability of the access layer switches. Priority access into the core is provided based onLayer 3 QoS tagsDIP precedence, DSCP, QoS group, IP address, and ingress interface are Layer 2 characteristics that are set by the access layer as it passes traffic to the distribution layer. Thedistribution layer, once it has made a switching decision to the core layer, strips these offEMAC address, Multiprotocol Label Switching (MPLS); the ATM cell loss priority (CLP) bit, theFrame Relay discard eligible (DE) bit, and ingress interface are established by the voicesubmodule (distribution layer) as traffic passes to the core layerFThe distribution layer inspects a frame to see if it has exceeded a predefined rate of trafficwithin a certain time frame, which is typically a fixed number internal to the switch. If a frame isdetermined to be in excess of the predefined rate limit, the CoS value can be marked up in a waythat results in the packet being dropped

考题 单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your networkcarries both VOIP and data traffic. You agree with your service provider to classify VOIP and data trafficaccording to the different service RFCs. How can your data and VOIP traffic be marked?()A data marked with DSCP AF21,VOIP marked with DSCP EFB data marked with DSCP AF51,VOIP marked with DSCP EFC data marked with the DE-bit. VOIP marked with the CLP-bitD data marked with DSCP EF,VOIP marked with DSCP AF31E data marked with IP precedence 5,VOIP marked with DSCP EF

考题 单选题Prior to applying SCREEN options to drop traffic, you want to determine how your configuration will affect traffic. Which mechanism would you configure to achieve this objective?()A the log option for the particular SCREEN optionB the permit option for the particular SCREEN optionC the SCREEN option, because it does not drop traffic by defaultD the alarm-without-drop option for the particular SCREEN option

考题 单选题You are the network administrator of an enterprise with a main site and multiple remote sites. Your network carries both VOIP and data traffic. You agree with your service provider to classify VOIP and data traffic according to the different service RFCs. How can your data and VOIP traffic be marked?()A data marked with DSCP AF21,VOIP marked with DSCP EFB data marked with DSCP AF51,VOIP marked with DSCP EFC data marked with the DE-bit,VOIP marked with the CLP-bitD data marked with DSCP EF,VOIP marked with DSCP AF31E data marked with IP precedence 5 VOIP marked with DSCP EF

考题 多选题Which two QoS statements are true about the use of the SDM QoS wizard? ()ABusiness-critical traffic includes VoIP and voice signaling packets.BSDM can be used to configure a basic QoS policy for incoming traffic on WAN interfaces and IPsec tunnels.CSDM can provide QoS for real-time traffic and business-critical traffic.DSDM creates a custom-queuing (CQ) or a priority-queuing (PQ) policy.ESDM creates a low latency queuing (LLQ) service policy with its associated classes.FWhen allocating bandwidth, values can be entered in either bandwidth percentage or kilobytes per second (kBps).

考题 单选题Which statement best describes the application of link fragmentation and interleaving (LFI)?()A It compresses the Layer 2 payload and marks the packet as a high priority to be transmitted firstB It fragments larger packets and allows VoIP packets to be transmitted in between them.C It stops the transmission of large packets when priority packets arrive.D It sends high priority packets in between normal traffic packets.

考题 多选题In which two ways can you influence how downstream LSRs treat MPLS traffic?()AUse an EXP rewrite table.BUse a DSCP rewrite table.CStatically assign a CoS value to an LDP-signaled LSPDStatically assign a CoS value to an RSVP-signlated LSP

考题 单选题Your Cisco network currently runs OSPF and you have a need to policy-route some specific traffic,regardless of what the routing table shows. Which one of these options would enable you to policy-route the traffic?()A source IP address and the protocol (such as SSL,HTTPS,SSH)B the packet Time to Live and the source IP addressC type of service header and DSCP valueD destination IP address

考题 多选题In which two ways can you influence how downstream LSRs treat MPLS traffic?()AUse an EXP rewrite table.BUse a DSCP rewrite table.CStatically assign a CoS value to an LDP-signaled LSP.DStatically assign a CoS value to an RSVP-signaled LSP.