多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm
多选题
Which two of these are differences between traffic policing and traffic shaping?()
A
with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available again
B
with policing you can tune the buffer usage for traffic exceeding the specified CIR
C
with shaping you can tune the buffer usage for traffic exceeding the specified CIR
D
shaping should only be applied for ingress traffic,policing only for egress
E
policing uses a token bucket algorithm,shaping uses an SPD algorithm
参考解析
解析:
暂无解析
相关考题:
Users can define policy to control traffic flow between which two components? ()(Choose two.) A. from a zone to the router itselfB. from a zone to the same zoneC. from a zone to a different zoneD. from one interface to another interface
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?() A. ICMPB. SNMPC. TCPD. HTTPS
An administrator is using a protocol analyzer to monitor traffic between two servers. However, theonly traffic that appears is broadcast and traffic originating from the administrator‘s PC.Which of the following devices is the administrator plugged into? ()A.HubB. BridgeC. SwitchD. Router
Refer to the exhibit. Which two of these are characteristics of a firewall running in transparent mode?() A. FWSM routes traffic between the VLANs.B. FWSM switches traffic between the VLANs.C. Transparent mode is often called bump-in-the-wire mode.D. Transparent mode firewall deployments are used most often in current designs.E. Traffic routed between VLANs is subject to state tracking and other firewall configurable options.
Which two characteristics are true of a firewall running in routed mode based on the following information?() A. FWSM routes traffic between the VLANs.B. FWSM switches traffic between the VLANs.C. Routed mode is often called bump-in-the-wire mode.D. Routed mode firewall deployments are used most often in current designs.
Which two benefits are provided by creating VLANs?() A. added securityB. dedicated bandwidthC. provides segmentationD. allows switches to route traffic between subinterfacesE. contains collisions
Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm
Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
Which two statements describe traffic policing?()A、Traffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataB、Excess traffic is buffered so that the traffic remains within the desired rate.C、Packets that conform to traffic policies are not delayed.D、Packet marking is available and allows excess packets to be re-marked with a lower priorit
Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.
You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS
Which two benefits are provided by creating VLANs? ()A、added securityB、dedicated bandwidthC、provides segmentationD、allows switches to route traffic between subinterfacesE、contains collisions
An administrator is using a protocol analyzer to monitor traffic between two servers. However, the only traffic that appears is broadcast and traffic originating from the administrator's PC. Which of the following devices is the administrator plugged into? ()A、HubB、BridgeC、SwitchD、Router
When load balancing traffic between two web servers, which of the following technologies provides the LOWEST cost solution?()A、 Active/passive clusterB、 Active/active clusterC、 Log shippingD、 DNS round robin
Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()A、family inetB、a security zoneC、a routing instanceD、host-inbound-traffic
Users can define policy to control traffic flow between which two components? ()(Choose two.)A、from a zone to the router itselfB、from a zone to the same zoneC、from a zone to a different zoneD、from one interface to another interface
多选题The Lightweight Access Point Protocol (LWAPP) is in use within the Company wireless network. Which two statements correctly describe features of this protocol? ()AControl traffic between an access point and a controller is encrypted within LWAPP.BData traffic between an access point and a controller is encrypted within LWAPP.CLayer 3 mode packets are transmitted in TCP frames.DData traffic between an access point and a controller is encapsulated within LWAPP.EVLAN tagging and QoS markings are applied at the access point.
多选题Which two benefits are provided by creating VLANs? ()Aadded securityBdedicated bandwidthCprovides segmentationDallows switches to route traffic between subinterfacesEcontains collisions
多选题Which of the following statemets regarding Control Plane Policing (CoPP) is correct?()AControl Plane Policing (CoPP) addresses the need to protect the management planes, ensuring routingstability, availability, and critical packet delivery.BControl Plane Policing (CoPP) leverages MQC to define traffic classification criteria and to specifyconfigurable policy actions for the classified traffic.CControl Plane Policing (CoPP) uses a dedicated control-plane command via the Modular QoS CLI (MQC)to provide filtering and rate limiting capabilities.DControl Plane Policing (CoPP) uses service policy command under relevant interfaces to filter DOS packet to protect routing packets.EControl Plane Policing (CoPP) protects the transit management and data traffic through the router.
单选题An administrator is troubleshooting a communication issue between two computers on the same Layer 2 switch. Which of the following is the BEST way to determine if the switch is causing the issue?()ASetup an ACL that allows and logs all IP traffic between the two computersBConfigure a spanning tree to check for a loopCSetup a span port on the switch to watch for CRC errorsDConnect both computers using a crossover cable
多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm
多选题Users can define policy to control traffic flow between which two components?()Afrom a zone to the device itselfBfrom a zone to the same zoneCfrom a zone to a different zoneDfrom one interface to another interface
多选题Which two configuration options must be present for IPv4 transit traffic to pass between the ge-0/0/0.0 andge-0/0/2.0 interfaces?()Afamily inetBa security zoneCa routing instanceDhost-inbound-traffic
多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.
多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate
多选题Which two statements describe traffic policing?()ATraffic bursts are smoothed out by queuing the excess traffic to produce a steadier flow of dataBExcess traffic is buffered so that the traffic remains within the desired rate.CPackets that conform to traffic policies are not delayed.DPacket marking is available and allows excess packets to be re-marked with a lower priorit
单选题Instead, I’ll _______ on the differences between the two versions; unfortunately most of the differences took away from the original film, _______ I think is truly excellent.Aexplain; that Bcomment; which Canalyse; as Dremark; what