单选题Which traffic descriptor s can be recognized and categorized by cisco quality of service(qos)features?()A incoming interface.outgoing interface.ip precedence.and differentiated services code P.oint(DSCP).B Incoming interace.ip precedence.differentiated services code point(DSCP),and source or d.estination address.C Outgoing interface.ip precedence.differentiated services code point(DSCP).and source or d.estination address.D Incoming interface .outgoing interface.ip precedence and differentiated code point s.ervices(DCPS)E Incoming interface .ip precedence .and source or destination address. F Outgoing interface.ip precedence .and source or destination address.

单选题
Which traffic descriptor s can be recognized and categorized by cisco quality of service(qos)features?()
A

 incoming interface.outgoing interface.ip precedence.and differentiated services code  P.oint(DSCP).

B

 Incoming interace.ip precedence.differentiated services code point(DSCP),and source or d.estination address.

C

 Outgoing interface.ip precedence.differentiated services code point(DSCP).and source or d.estination address.

D

 Incoming interface .outgoing interface.ip precedence and differentiated code point s.ervices(DCPS)

E

 Incoming interface .ip precedence .and source or destination address. 

F

 Outgoing interface.ip precedence .and source or destination address.


参考解析

解析: 暂无解析

相关考题:

Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

Which two statements about an IDS are true?()A、The IDS is in the traffic path.B、The IDS can send TCP resets to the source device.C、The IDS can send TCP resets to the destination device.D、The IDS listens promiscuously to all traffic on the network.E、Default operation is for the IDS to discard malicious traffic.

Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

Which four statements about NetFlow are true?()A、NetFlow records bidirectional IP traffic flow.B、NetFlow export can be implemented over IPv4.C、NetFlow export can be implemented over IPv6.D、NetFlow records multicast IP traffic flow.E、NetFlow records ingress traffic.F、NetFlow records egress traffic.

Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted

When designing a converged network, which measures can be taken at the building access layerto help eliminate latency and ensure end-to-end quality of service can be maintained?()A、 rate limit voice trafficB、 configure spanning-tree for fast link convergenceC、 isolate voice traffic on separate VLANsD、 classify and mark traffic close to the source

Which traffic descriptor is used for marking? ()A、weighted RED (WRED) orange or green labelsB、modular QoS CLI (MQC) application layer tagsC、Deficit Round Robin (DRR) precedence bitsD、header compression tagsE、MPLS experimental bitsF、FIFO Layer 2 descriptor labels (L2DL)

Which BGP attribute can be used to influence inbound traffic flow?()A、cluster IDB、WeightC、MEDD、local preferenceE、aggregate

Which security mechanism can be directed through the  element in a web deployment descriptor()?A、 authorizationB、 data integrityC、 confidentialityD、 authentication

Which two security mechanisms can be directed through a sub-element of the element in a web application deployment descriptor?()A、AuthorizationB、Data integrityC、ConfidentialityD、Authentication

Which two statements are true about using the isUserInRole method to implement security in a Java EEapplication?()A、It can be invoked only from the doGet or doPost methods.B、It can be used independently of the getRemoteUser method.C、Can return "true" even when its argument is NOT defined as a valid role name in the deployment descriptor.D、Using the isUserInRole method overrides any declarative authentication related to the method in which it is invoked.

单选题Which traffic descriptor is used for marking? ()Aweighted RED (WRED) orange or green labelsBmodular QoS CLI (MQC) application layer tagsCDeficit Round Robin (DRR) precedence bitsDheader compression tagsEMPLS experimental bitsFFIFO Layer 2 descriptor labels (L2DL)

多选题Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()AICMP EchoBVoIP (RTP)CIPXDSNMP

单选题Which BGP attribute can be used to influence inbound traffic flow?()Acluster IDBWeightCMEDDlocal preferenceEaggregate

单选题Which statement about HTTPS decryption on the WSA is true?()Aif enabled, all HTTPS traffic must be decryptedBif WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedCdecrypted HTTPS traffic is sent unencrypted across the enterprise intranetDobject size can be used to determine whether the HTTPS traffic is to be decrypted

多选题Which of the following can be an expected outcome of a VLAN?()AVLANs logically divide a switch into multiple, independent switches at Layer 2.BTrunk links can carry traffic for multiple VLANs.CVLAN implementation significantly increases traffic due to added trunking information.DVLANs can span multiple switches.EVLANs typically decrease the number of switches needed

多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface

单选题Which security mechanism can be directed through the  element in a web deployment descriptor()?A authorizationB data integrityC confidentialityD authentication

多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

单选题As an experienced network administrator, you are asked to troubleshoot a QoS problem. In which way might the Cisco NetFlow be helpful during the troubleshooting process?()ANetFlow can discover the protocols in use and automatically adjust QoS traffic classes to meet policy-map requirements.BNetFlow records can be used to understand traffic profiles per class of service for data, voice, and video traffic.CNetFlow can be configured to identify voice and video traffic flows and place them into a low-latency queue for expedited processing.DNetFlow can report on the number of traffic matches for each class map in a configured QoS policy configuration.

单选题Which attribute can influence inbound traffic flows from a neighboring AS?()AAggregatorBLocal preferenceCAtomic aggregateDMultiple exit discriminator

多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

多选题Which four statements about NetFlow are true?()ANetFlow records bidirectional IP traffic flow.BNetFlow export can be implemented over IPv4.CNetFlow export can be implemented over IPv6.DNetFlow records multicast IP traffic flow.ENetFlow records ingress traffic.FNetFlow records egress traffic.

多选题Which two statements about an IDS are true?()AThe IDS is in the traffic path.BThe IDS can send TCP resets to the source device.CThe IDS can send TCP resets to the destination device.DThe IDS listens promiscuously to all traffic on the network.EDefault operation is for the IDS to discard malicious traffic.