多选题Which two options can be used as traffic descriptors when classifying and marking traffic? ()Aincoming interfaceBLayer 2 differentiated services code point (DSCP)CLayer 3 IP precedenceDoutgoing interface

多选题
Which two options can be used as traffic descriptors when classifying and marking traffic? ()
A

incoming interface

B

Layer 2 differentiated services code point (DSCP)

C

Layer 3 IP precedence

D

outgoing interface


参考解析

解析: 暂无解析

相关考题:

Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.) A. The ADR base keeps all diagnostic information in binary formatB. SQL*Plus provides the ADRI script, which can be used to work with ADRC. The ADR can be used for problem diagnosis only when the database is openD. The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullE. The ADR can be used for problem diagnosis even when the database instance is downF. The ADR base is shared across multiple instances

Which are the two options to which a menu can be assigned?() (Choose two.) A.menuB.functionsC.data groupD.responsibilityE.functional group

Which two statements are true with regard to policy ordering? ()(Choose two.) A. The last policy is the default policy, which allows all traffic.B. The order of policies is not important.C. New policies are placed at the end of the policy list.D. The insert command can be used to change the order.

In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()A、loop guardB、storm controlC、storm suppressionD、broadcast suppressionE、BPDU guard

Which two statements are true regarding trace options on Junos devices?()A、You can see the contents of the log file by entering the show log filename commandB、Trace options will send information to your screen automaticallyC、Trace options are limited to one protocol at a timeD、The file name and set of flags may be specified when enabling trace options

Which are the two options to which a menu can be assigned?() (Choose two.)A、menuB、functionsC、data groupD、responsibilityE、functional group

Which two actions can be configured to allow traffic to traverse an interface when zone-based security isbeing employed?()A、PassB、FlowC、AllowD、Inspect

Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()A、protocol typeB、CoSC、DSCPD、IP precedenceE、destination addressF、input interface

Which two QoS statements are true about the use of the SDMQoS wizard?()A、business-critical traffic includes VoIP and voice signaling packetsB、SDM can be used to configure a basic QoS policy for incoming traffic on WAN interfaces andIPsec tunnelsC、SDM can provide QoS for real-time traffic and business-critical trafficD、SDM creates a custom-queuing (CQ) or a priority-queuing (PQ) policyE、SDM creates a low latency queuing (LLQ) service policy with its associated classesF、when allocating bandwidth, values can be entered in either bandwidth percentage or kilobytes per second (kBps)

Which command can be used to modify network options?()A、netstatB、ifconfigC、chdevD、no

Which two statements are true about the Automatic Diagnostic Repository (ADR)?() A、 The ADR base keeps all diagnostic information in binary formatB、 SQL*Plus provides the ADRI script, which can be used to work with ADRC、 The ADR can be used for problem diagnosis only when the database is openD、 The ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullE、 The ADR can be used for problem diagnosis even when the database instance is downF、 The ADR base is shared across multiple instances

多选题Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()Aprotocol typeBCoSCDSCPDIP precedenceEdestination addressFinput interface

多选题Which two statements are true with regard to policy ordering? ()(Choose two.)AThe last policy is the default policy, which allows all traffic.BThe order of policies is not important.CNew policies are placed at the end of the policy list.DThe insert command can be used to change the order.

多选题Which are the two options to which a menu can be assigned?() (Choose two.)AmenuBfunctionsCdata groupDresponsibilityEfunctional group

多选题What are three traffic descriptors typically used to categorize traffic into different classes?()AIP precedenceBmedia typeCDSCPDoutgoing interfaceEincoming interfaceFDLCI

单选题Which statement is true?()A A flow layout can be used to position a component that should resize horizontally when the  container is resized.B A grid layout can be used to position a component tat should maintain a constant size even when  the container is resized.C A border layout can be used to position component that should maintain a constant size even when  the container is resized.D The grid bag layout can be used to give a grid-like layout which differs from the normal grid in that individual rows and columns can have unique sizes.E If two components are placed in the same column of a grid bag layout, and one component resizes horizontally, then the other component must resize horizontally.

单选题Which command can be used to modify network options?()AnetstatBifconfigCchdevDno

多选题Which two statements are correct about firewall filters in the Junos OS?()AFirewall filters are stateless.BFirewall filters are used to control routing information that is exchanged between devices.CFirewall filters are used to control traffic passing through the device.DFirewall filters can only be applied to traffic entering the device.

多选题Which two statements are true regarding IDP?()AIDP can be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options, zones, and security policy.CIDP inspects traffic up to the Presentation layer.DIDP inspects traffic up to the Application layer.

多选题Which two statements are true regarding trace options on Junos devices?()AYou can see the contents of the log file by entering the show log filename commandBTrace options will send information to your screen automaticallyCTrace options are limited to one protocol at a timeDThe file name and set of flags may be specified when enabling trace options

多选题Which three options can be used with the load CLI command?()AmergeBreplaceCpartialDcompleteEoverride

多选题Which three statements are true regarding IDP?()AIDP cannot be used in conjunction with other JUNOS Software security features such as SCREEN options,zones, and security policy.BIDP inspects traffic up to the Application layer.CIDP searches the data stream for specific attack patterns.DIDP inspects traffic up to the Presentation layer.EIDP can drop packets, close sessions, prevent future sessions, and log attacks for review by network administrators when an attack is detected.

多选题Which two statements about the use of SCREEN options are correct?()ASCREEN options are deployed at the ingress and egress sides of a packet flow.BAlthough SCREEN options are very useful, their use can result in more session creation.CSCREEN options offer protection against various attacks at the ingress zone of a packet flow.DSCREEN options examine traffic prior to policy processing, thereby resulting in fewer resouces used formalicious packet processing.

多选题Which two statements are true about the Automatic Diagnostic Repository (ADR)?()AThe ADR base keeps all diagnostic information in binary formatBSQL*Plus provides the ADRI script, which can be used to work with ADRCThe ADR can be used for problem diagnosis only when the database is openDThe ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullEThe ADR can be used for problem diagnosis even when the database instance is downFThe ADR base is shared across multiple instances

多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops can cause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limit excessive traffic during spanning-tree loop conditions? ()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard

多选题Which two statements are true about the Automatic Diagnostic Repository (ADR)?() (Choose two.)AThe ADR base keeps all diagnostic information in binary formatBSQL*Plus provides the ADRI script, which can be used to work with ADRCThe ADR can be used for problem diagnosis only when the database is openDThe ADR can be disabled by settting the DIAGNOSTIC_DEST parameter to nullEThe ADR can be used for problem diagnosis even when the database instance is downFThe ADR base is shared across multiple instances

多选题In Layer 2 topologies, spanning-tree failures can cause loops in the network. These unblocked loops cancause network failures because of excessive traffic. Which two Catalyst 6500 features can be used to limitexcessive traffic during spanning-tree loop conditions?()Aloop guardBstorm controlCstorm suppressionDbroadcast suppressionEBPDU guard