多选题In which three network technologies is traffic shaping used to prevent and manage congestion? ()AAsynchronous Transfer Mode (ATM)Bdata-link switching (DLSw)CRoute Processor Redundancy (RPR)DFrame Relay (FR)EMetro EthernetFMultiprotocol Label Switching (MPLS)

多选题
In which three network technologies is traffic shaping used to prevent and manage congestion? ()
A

Asynchronous Transfer Mode (ATM)

B

data-link switching (DLSw)

C

Route Processor Redundancy (RPR)

D

Frame Relay (FR)

E

Metro Ethernet

F

Multiprotocol Label Switching (MPLS)


参考解析

解析: 暂无解析

相关考题:

Which three SONET network elements are used for troubleshooting?() A.lineB.pathC.circuitD.sectionE.segment

Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO) A. Load balancingB. Caching enginesC. QosD. Fault tolerance systemsE. Traffic shaping

Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?() A.SwitchB.HubC.ModemD.Repeater

Which two of these are differences between traffic policing and traffic shaping?()A、with traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againB、with policing you can tune the buffer usage for traffic exceeding the specified CIRC、with shaping you can tune the buffer usage for traffic exceeding the specified CIRD、shaping should only be applied for ingress traffic,policing only for egressE、policing uses a token bucket algorithm,shaping uses an SPD algorithm

Which two statements are true about traffic shaping and traffic policing?()A、both traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPB、both traffic shaping and traffic policing support the marking and re-marking of trafficC、the effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficD、traffic shaping queues excess traffic whereas traffic policing discards excess trafficE、traffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate

Which two characteristics are common between traffic policing and traffic shaping?()A、 The rate of traffic is measured and compared to a configured policy.B、 Classification is used to differentiate traffic.C、 Traffic is marked and sent out according to priority.D、 Both can be applied to inbound and outbound traffic.E、 Both buffer traffic to ensure a predetermined traffic rate.F、 Both drop traffic that is above a predetermined traffic rate.

Which two of these are characteristics of an IDS sensor?()A、passively listens to network trafficB、is an active device in the traffic pathC、has a permissive interface that is used to monitor networksD、traffic arrives on one IDS interface and exits on anotherE、has a promiscuous interface that is used to monitor the network

Cisco IOS NetFlow gathers data that can be used in which three of these? ()A、 accountingB、 authenticationC、 authorizationD、 network monitoringE、 network planning

Which three are characteristics of voice traffic in the Company VOIP campus network?()A、TCP retransmitsB、UDP priorityC、BurstyD、Delay sensitiveE、GreedyF、Drop sensitive

Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library

Which Cisco IOS traffic-shaping mechanism statement is true? ()A、class-based policing is configured using the Modular QoS command-line (MQC)B、only the Frame Relay traffic-shaping (FRTS) mechanism can interact with a Frame Relay network, adapting to indications of Layer2 congestion in the WAN linksC、Distributed Traffic Shaping (DTS) is configured with the police command under the policy map configurationD、both Frame Relay traffic shaping (FRTS) and virtual IP (VIP)-based Distributed Traffic Shaping (DTS) have the ability to mark traffic

Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()A、protocol typeB、CoSC、DSCPD、IP precedenceE、destination addressF、input interface

In which three network technologies is traffic shaping used to prevent and manage congestion? ()A、Asynchronous Transfer Mode (ATM)B、data-link switching (DLSw)C、Route Processor Redundancy (RPR)D、Frame Relay (FR)E、Metro EthernetF、Multiprotocol Label Switching (MPLS)

Which three characteristics are true about voice traffic in the campus network? ()A、TCP retransmitsB、benignC、greedyD、drop sensitiveE、smoothF、delay insensitive

what is Cisco provides three mechanisms for regulating or shaping traffic?

Which of the following devices is used to connect multiple devices to a network and does not stopbroadcast traffic?()A、SwitchB、HubC、ModemD、Repeater

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

Which of the following features would BEST be used to optimize real-time voice and video chat?()(Select TWO)A、Load balancingB、Caching enginesC、QosD、Fault tolerance systemsE、Traffic shaping

Which three SONET network elements are used for troubleshooting?()A、lineB、pathC、circuitD、sectionE、segment

多选题Which three traffic descriptors are typically used as QoS markings for packets or frames entering the network?()Aprotocol typeBCoSCDSCPDIP precedenceEdestination addressFinput interface

问答题what is Cisco provides three mechanisms for regulating or shaping traffic?

多选题Which three characteristics are true about voice traffic in the campus network? ()ATCP retransmitsBbenignCgreedyDdrop sensitiveEsmoothFdelay insensitive

多选题Which three are characteristics of voice traffic in the Company VOIP campus network?()ATCP retransmitsBUDP priorityCBurstyDDelay sensitiveEGreedyFDrop sensitive

多选题Which two of these are differences between traffic policing and traffic shaping?()Awith traffic shaping,a router stores excess traffic in packet buffers until bandwidth is available againBwith policing you can tune the buffer usage for traffic exceeding the specified CIRCwith shaping you can tune the buffer usage for traffic exceeding the specified CIRDshaping should only be applied for ingress traffic,policing only for egressEpolicing uses a token bucket algorithm,shaping uses an SPD algorithm

多选题Which three SONET network elements are used for troubleshooting?()AlineBpathCcircuitDsectionEsegment

多选题Which two characteristics are common between traffic policing and traffic shaping?()AThe rate of traffic is measured and compared to a configured policy.BClassification is used to differentiate traffic.CTraffic is marked and sent out according to priority.DBoth can be applied to inbound and outbound traffic.EBoth buffer traffic to ensure a predetermined traffic rate.FBoth drop traffic that is above a predetermined traffic rate.

多选题Which two statements are true about traffic shaping and traffic policing?()Aboth traffic shaping and traffic policing cause retransmissions of connection-oriented protocols such as TCPBboth traffic shaping and traffic policing support the marking and re-marking of trafficCthe effects of traffic shaping and traffic policing when configured on a router are applied to outgoing trafficDtraffic shaping queues excess traffic whereas traffic policing discards excess trafficEtraffic shaping allows the traffic to exceed the bit rate whereas traffic policing prevents the traffic from exceeding the bit rate