单选题The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A show asp dropB show counters dropC show security-policyD show policy-map

单选题
The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()
A

 show asp drop

B

 show counters drop

C

 show security-policy

D

 show policy-map


参考解析

解析: 暂无解析

相关考题:

Click the Exhibit button. Referring to the exhibit, which statement is true about the IP packet flow through interface ge-3/0/0.0?() A. All packets set to be forwarded out interface ge-3/0/0 will be dropped by the firewall filter fire1.B. All packets set to be forwarded out interface ge-3/0/0 will NOT dropped by the firewall filter fire1.C. All packets entering the router on interface ge-3/0/0.0 will be dropped by the firewall filter fire1.D. All packets set to be forwarded out interface ge-3/0/0, except those sourced locally by the Routing Engine, will be dropped by the firewall filter fire1.

The following exhibit displays the NetFlow statistics for a CIS router, which will be helpful for a network administrator to collect IP traffic information.Which two numbers separately refer to the percentage of packets sized between 32 and 64 bytes and the number of flows in progress?()A. 24.9%, 980B. 6.94%, 980C. 69.4%, 35D. cannot be determined from this outputE. 69.4%, 4061

Refer to the exhibit. For interface FastEthernet0/0, what will happen to dscp af11 traffic if the queue for class newclass reaches a depth of 40? () A. All packets will be dropped.B. One out of ten packets will be dropped.C. A random number of packets will be dropped.D. No packets will be dropped until the queue depth reaches 265.E. Packets will be dropped according to the exponential weight setting.

Refer to the exhibit. On the basis of the configuration provided, how are the Hello packets sent by R2 handled by R5 in OSPF area 5?() A. The Hello packets will be exchanged and adjacency will be established between routers R2 and R5.B. The Hello packets will be exchanged but the routers R2 and R5 will become neighbors only.C. The Hello packets will be dropped and no adjacency will be established between routers R2 and R5.D. The Hello packets will be dropped but the routers R 2 and R5 will become neighbors.

Refer to the exhibit. Which two statements are true?() A. DHCPDISCOVER packets will reach the DHCP server.B. The router will not forward DHCPDIS COVER packets because it has not been configured to do so.C. This configuration is applied to interface Fa0/1.D. DHCPDISCOVER packets will not reach the DHCP server because DHCPDISCOVER packets are broadcasts.E. DHCPDISCOVER packets will not reach the DHCP server because ports 67 and 68 have not been explicitly allowed by the ip forward - protocol command.F. This configuration is applied to interface Fa0/0.

What two statistics appear in show frame-relay map output?() A. The number of FECN packets that are received by the routerB. The number of BECN packets that are received by the routerC. The ip address of the local routerD. The value of the local DLCIE. The status of the PVC that is configured on the router

Which three statements are true about the data traffic characteristics of voice traffic? ()A、latency must be kept below 150 msB、latency is not a concern as long as jitter is kept below 30 msC、voice packets do not require a specific type of queuingD、voice packets are rather smallE、voice packets require TCP for rapid retransmission of dropped packetsF、voice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

Which statement is true about the comparison of voice traffic with video traffic?()A、 Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B、 Latency requirements are less stringent for video traffic than for voice traffic.C、 Video traffic is less sensitive to dropped packets than for voice traffic.D、 Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E、 Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F、 Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

You are maintaining your database in Oracle10g. You are performing an incomplete recovery because the tablespace, DATA1, was dropped and purged from the Recycle Bin. After performing an incomplete recovery, you open the database with the RESETLOGS option.  What will NOT be the impact of using the RESETLOGS option?()A、 The log sequence for the database will restart from 1.B、 The log sequence number will be written to the control file.C、 The log sequence number will be written to the datafile headers.D、 The log sequence number will be written to the initialization parameter file.

Which of the following is the primary consideration to scale VPNs?()A、 packets per secondB、 number of remote sitesC、 throughput bandwidthD、 number of tunnels

When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()A、the number of packets that are discarded because they exceed the maximum packet size of the mediumB、errors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.C、the number of packets that are discarded because they are smaller than the minimum packet size of the mediumD、the number of received packets that were ignored by the interface because the interface hardware ran low on internal buffersE、the number of times that the interface requested another interface within the router to slow down

What does Grade of Service (GoS) mean? ()A、Number of available subscriber servicesB、Number of unsuccessful call set-ups due to congestionC、Channel utilizationD、Number of successful call set-upsE、Number of dropped calls

The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A、 show asp dropB、 show counters dropC、 show security-policyD、 show policy-map

What two statistics appear in show frame-relay map output?()A、The number of FECN packets that are received by the routerB、The number of BECN packets that are received by the router.C、The ip address of the local routerD、The value of the local DLCIE、The status of the PVC that is configured on the router

Why is QoS important in a converged network?()A、Because data does not need to arrive intact, so data transfer rates can be variableB、Because lost voice-data packets must be retransmittedC、Because voice data packets should arrive quickly and sequentially, and with no lost dataD、Because voice data packets must follow a single dedicated path through the network

What are two major sources of delay that can be managed by QoS in voice-enabled networks?()A、propagation delayB、voice packet serialization delayC、congested egress queuesD、header overheadE、packets dropped because of CRC errors

Interface congestion is causing drops in voice packets and TCP packets. The drops result in jerky speech quality and slower FTP traffic flows. Which two technologies would proactively address the TCP transfer rate and the voice problems?()A、CBWFQB、LLQC、traffic shapingD、WRED

What two statistics appear in show frame-relay map output?()A、The number of FECN packets that are received by the routerB、The number of BECN packets that are received by the routerC、The ip address of the local routerD、The value of the local DLCIE、The status of the PVC that is configured on the router

单选题Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery, you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method. You want to preserve these objects. Which option must you use to perform TSPITR and preserve the object?()APerform Export before TSPITR and Import after TSPITRBMove objects to another schema that has the same tablespace assignedCPerform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)DPerform Incomplete Recovery before TSPITR with the System Change Number (SCN)

单选题When troubleshooting a network, the output of the command show interfaces indicates a large number of runts. What is a runt?()Athe number of packets that are discarded because they exceed the maximum packet size of the mediumBerrors created when the CRC generated by the originating LAN station or far-end device does not match the checksum calculated from the data received.Cthe number of packets that are discarded because they are smaller than the minimum packet size of the mediumDthe number of received packets that were ignored by the interface because the interface hardware ran low on internal buffersEthe number of times that the interface requested another interface within the router to slow down

多选题Which three statements are true about the data traffic characteristics of voice traffic? ()Alatency must be kept below 150 msBlatency is not a concern as long as jitter is kept below 30 msCvoice packets do not require a specific type of queuingDvoice packets are rather smallEvoice packets require TCP for rapid retransmission of dropped packetsFvoice packets require a fairly constant bandwidth reserved for voice control traffic as well as forthe voice payload

单选题Because of a logical corruption in your production database, you wanted to perform Tablespace Point in Time Recovery (TSPITR). But before you start the recovery,you queried the TS_PITR_OBJECTS_TO_BE_DROPPED view and realized that there are a large number of objects that would be dropped when you start the recovery by using this method. You want to preserve these objects.  Which option must you use to perform TSPITR and preserve the object?()A Perform Export before TSPITR and Import after TSPITRB Move objects to another schema that has the same tablespace assignedC Perform Incomplete Recovery before TSPITR with the Log Sequence Number (LSN)D Perform Incomplete Recovery before TSPITR with the System Change Number (SCN)

单选题Which of the following is the primary consideration to scale VPNs?()A packets per secondB number of remote sitesC throughput bandwidthD number of tunnels

单选题Which statement is true about the comparison of voice traffic with video traffic?()A Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B Latency requirements are less stringent for video traffic than for voice traffic.C Video traffic is less sensitive to dropped packets than for voice traffic.D Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

多选题What two statistics appear in show frame-relay map output?()AThe number of FECN packets that are received by the routerBThe number of BECN packets that are received by the routerCThe ip address of the local routerDThe value of the local DLCIEThe status of the PVC that is configured on the router

多选题What are three problems with the tail drop mechanism of managing interface congestion?()AQueuing introduces equal delays for packets of the same flow, resulting in jitter.BWhen congestion occurs, dropping affects most of the TCP sessions, which simultaneously back off and then restart again.CAll buffers can temporarily be seized by aggressive flows, and normal TCP flows experience buffer starvation.DThere is no differentiated drop mechanism. Higher priority traffic is dropped in the same way as best-effort traffic.EIn TCP starvation, traffic exceeds the queue limit because of the bursty nature of packet networks. A router cannot handle multiple concurrent TCP sessions.FGlobal synchronization occurs because multiple TCP hosts reduce their transmission rates at random intervals in response to packet dropping

单选题The number of packets (or flows) dropped because they do not conform to the ASA/PIX security policy can be viewed using what command? ()A show asp dropB show counters dropC show security-policyD show policy-map

单选题What is the best way to ensure that IKE/ISAKMP packets are not dropped when QoS is enabled on the uplink interface of the Teleworker router?()AQoS and IPSec should never be used together. BIKE/ISAKMP packets are DiffSERV codepoint CS6, so the traffic is never dropped.CSource IKE/ISAKMP packets off the loop-back address. DClassify IKE/ISAKMP packets so they are appropriately prioritized.