多选题Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()AICMP EchoBVoIP (RTP)CIPXDSNMP
多选题
Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()
A
ICMP Echo
B
VoIP (RTP)
C
IPX
D
SNMP
参考解析
解析:
暂无解析
相关考题:
Which of the following can lead to the contribution of LAN traffic congestion?(Select all that apply)A. Too many hosts in a broadcast domainB. Full duplex operationC. Broadcast stormsD. MulticastingE. SegmentationF. Low bandwidth
Which of the following are examples of physical security measures?() A. Policies and proceduresB. EncryptionC. Locked doorsD. Security personnelE. Backup tapes
Which of the following are advantages of using Dynamic Host Configuration Protocol?() A. IP addresses can be managed from a central pointB. Computers can automatically get new addressing when moved to a different network segmentC. Media Access Control addresses can be changed automaticallyD. The network speed can automatically adjust based on the type of traffic being generatedE. The HOSTS file on the computer can be validated for proper entries
Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?() A. ICMP EchoB. VoIP (RTP)C. IPXD. SNMP
Which of the following are examples of traffic that can be created as part of an IP Service -Level Agreement operation?()A、ICMP EchoB、VoIP (RTP)C、IPXD、SNMP
Which of the following are correct regarding ISDN?()A、Legacy DDR can use port information to define interesting traffic.B、Legacy DDR can configure multiple dialer configurations on the same interface.C、Legacy DDR can use ACLs to define interesting traffic.D、HDLC or PPP can be used to encapsulate ISDN D channel information.E、The BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.F、Dialer profiles cannot use extended ACLs to define interesting traffic.
Which of the following storage technologies connects by TCP/IP and can slow down network traffic?()A、SANB、Optical jukeboxC、NASD、Tape library
Which of the following can be an expected outcome of a VLAN?()A、VLANs logically divide a switch into multiple, independent switches at Layer 2.B、Trunk links can carry traffic for multiple VLANs.C、VLAN implementation significantly increases traffic due to added trunking information.D、VLANs can span multiple switches.E、VLANs typically decrease the number of switches needed
Which of the following can lead to the contribution of LAN traffic congestion?()A、Too many hosts in a broadcast domainB、Full duplex operationC、Broadcast stormsD、MulticastingE、SegmentationF、Low bandwidth
Which of the following IOS features can prevent IP spoofing attacks?()A、PPP over EthernetB、Cisco Express forwardingC、MPLS traffic EngineeringD、IS-IS routingE、Unicast Reverse Path Forwarding(uRPF)
Which statement about HTTPS decryption on the WSA is true?() A、if enabled, all HTTPS traffic must be decryptedB、if WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedC、decrypted HTTPS traffic is sent unencrypted across the enterprise intranetD、object size can be used to determine whether the HTTPS traffic is to be decrypted
For the following items, which management topology keeps management traffic isolated from ActualTests.comproduction traffic?()A、OTPB、OOBC、SAFED、MARS
Which of the following are ways to transport SAN traffic?()A、SATAB、iSCSIC、SCSID、Fiber channelE、PAT A
Which of the following should be configured to provide priority to voice traffic?()A、Port mirroringB、DMZC、QosD、Trunking
Which of the following are examples of physical security measures?()A、Policies and proceduresB、EncryptionC、Locked doorsD、Security personnelE、Backup tapes
Which of the following is the purpose of QoS?()A、Load balance traffic across multiple LAN and WAN links.B、Increase speed of network traffic.C、Classify, mark, and prioritize traffic on WAN and LAN linksD、Guarantee traffic delivery.
Which of the following are advantages of using Dynamic Host Configuration Protocol?()A、IP addresses can be managed from a central pointB、Computers can automatically get new addressing when moved to a different network segmentC、Media Access Control addresses can be changed automaticallyD、The network speed can automatically adjust based on the type of traffic being generatedE、The HOSTS file on the computer can be validated for proper entries
An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A、 PATB、 ACLsC、 Subnet maskingD、 Port blocking
单选题An administrator needs to configure a server to restrict mail traffic to an application server for security reasons. Which of the following techniques can be used to manage this?()A PATB ACLsC Subnet maskingD Port blocking
单选题Which of the following marine examples belongs to the open loop control system?()AAccommodation heating systemBSteering gearCBoiler controlDCargo control
单选题Which of the following is the purpose of QoS?()ALoad balance traffic across multiple LAN and WAN links.BIncrease speed of network traffic.CClassify, mark, and prioritize traffic on WAN and LAN linksDGuarantee traffic delivery.
单选题Which statement about HTTPS decryption on the WSA is true?()Aif enabled, all HTTPS traffic must be decryptedBif WBRS is enabled, it can be used to determine whether the HTTPS traffic is to be decryptedCdecrypted HTTPS traffic is sent unencrypted across the enterprise intranetDobject size can be used to determine whether the HTTPS traffic is to be decrypted
多选题Which of the following can be an expected outcome of a VLAN?()AVLANs logically divide a switch into multiple, independent switches at Layer 2.BTrunk links can carry traffic for multiple VLANs.CVLAN implementation significantly increases traffic due to added trunking information.DVLANs can span multiple switches.EVLANs typically decrease the number of switches needed
多选题Which of the following are examples of physical security measures?()APolicies and proceduresBEncryptionCLocked doorsDSecurity personnelEBackup tapes
多选题Which of the following can lead to the contribution of LAN traffic congestion?()AToo many hosts in a broadcast domainBFull duplex operationCBroadcast stormsDMulticastingESegmentationFLow bandwidth
多选题Which of the following are correct regarding ISDN?()ALegacy DDR can use port information to define interesting traffic.BLegacy DDR can configure multiple dialer configurations on the same interface.CLegacy DDR can use ACLs to define interesting traffic.DHDLC or PPP can be used to encapsulate ISDN D channel information.EThe BRI interfaces on ISDN routers with dialer profiles configured cannot belong to multiple dialer pools.FDialer profiles cannot use extended ACLs to define interesting traffic.
多选题Which of the following are ways to transport SAN traffic?()ASATABiSCSICSCSIDFiber channelEPATA