单选题Which application would be suited for UDP traffic?()AWeb browsingBdownloading a programCstreaming television showsDon-line shopping

单选题
Which application would be suited for UDP traffic?()
A

Web browsing

B

downloading a program

C

streaming television shows

D

on-line shopping


参考解析

解析: 暂无解析

相关考题:

Which application would be suited for UDP traffic?() A.Web browsingB.downloading a programC.streaming television showsD.on-line shopping

Which three statements describe the User Datagram Protocol (UDP)?() A.UDP provides delivery notification and error checking mechanisms.B.UDP is faster than the Transmission Control Protocol (TCP).C.UDP application examples include DNS and VoIP.D.UDP is an application layer protocol.E.UDP uses a best effort delivery approach.

Which of the following protocols can be found at the application layer?() A.TelnetB.TCPC.SNMPD.UDP

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?() A. Network layer firewallB. Stateful inspection firewallC. Zone aware firewallD. Application layer firewall

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?() A.IDSB.VPNC.NIPSD.HIDS

The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()A. nGenius Real-Time MonitorB. CiscoViewC. Device Fault ManagerD. Internetwork Performance Monitor

Which statement is true about the comparison of voice traffic with video traffic?()A、 Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B、 Latency requirements are less stringent for video traffic than for voice traffic.C、 Video traffic is less sensitive to dropped packets than for voice traffic.D、 Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E、 Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F、 Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

What is meant by the term "firewall sandwich"?()A、multiple layers of firewallingB、a method of operating firewalls from multiple vendorsC、firewall connections in either an active or standby stateD、an architecture in which all traffic between firewalls goes through application-specific serversE、an architecture in which all traffic between firewalls goes through application-specific gateways

Which three are characteristics of voice traffic in the Company VOIP campus network?()A、TCP retransmitsB、UDP priorityC、BurstyD、Delay sensitiveE、GreedyF、Drop sensitive

Which of the following would be BEST to use when identifying HTTP traffic running on TCP port53?()A、Network layer firewallB、Stateful inspection firewallC、Zone aware firewallD、Application layer firewall

Which three statements describe the User Datagram Protocol (UDP)?()A、UDP provides delivery notification and error checking mechanisms.B、UDP is faster than the Transmission Control Protocol (TCP).C、UDP application examples include DNS and VoIP.D、UDP is an application layer protocol.E、UDP uses a best effort delivery approach.

On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()A、SMTPB、DNSC、FTPD、TelnetE、HTTPF、POP3

You are asked to configure real-time performance monitoring (RPM) between two Junos devices to track traffic in your network. Which two application traffic types can you track?()A、ICMPB、SNMPC、TCPD、HTTPS

A company would like to create and maintain a web presence by operating a web server and anFTP server for users to upload and download job specifications. Which of the following Internetconnection types would be BEST suited for this type of traffic?()A、SatelliteB、FiberC、4G mobile hotspotD、DSL

An administrator of a peer-to-peer server application reports that the maximum bandwidth that his application receives is 90 Mb/s. You have an 8-port,100-Mb/s EtherChannel bundle on the switching infrastructure between the two servers, resulting in a bidirectional throughput of more than what is recorded. Which two solutions would allow for more bandwidth for the application?()A、change the EtherChannel default hashing algorithm from XOR to use source port Layer 4 port load balancing to better load balance the trafficB、change the EtherChannel default hashing algorithm from XOR to use destination Layer 4 port load balancing to better load balance the trafficC、have the application recoded to use multiple connections instead of a single connection so EtherChannel can better load balance the trafficD、upgrade the CPU and memory of the compute devices so they can better process trafficE、upgrade the EtherChannel bundle to a single gigabit link because EtherChannel is not well suited for single-connection traffic

Which of the following protocols can be found at the application layer?()A、TelnetB、TCPC、SNMPD、UDP

Which of the following security devices would MOST likely be used on a network to screen and prevent malicious traffic?()A、IDSB、VPNC、NIPSD、HIDS

Which of the following traffic types would a network layer firewall be unable to filter?()A、SMTP trafficB、ICMP messagesC、HTTP trafficD、Email sender verification

Which of the following would restrict traffic from a specific host to a network?()A、MIBsB、NASC、ACLD、SMTP

Which application would be suited for UDP traffic?()A、Web browsingB、downloading a programC、streaming television showsD、on-line shopping

多选题On the serial interface of a router, an inbound access list is configured to deny all traffic from UDP and TCP ports 21, 23, and 25. All other traffic is permitted. Based on this information, which types of traffic will be allowed through this interface?()ASMTPBDNSCFTPDTelnetEHTTPFPOP3

单选题A company would like to create and maintain a web presence by operating a web server and anFTP server for users to upload and download job specifications. Which of the following Internetconnection types would be BEST suited for this type of traffic?()ASatelliteBFiberC4G mobile hotspotDDSL

单选题If a CO2 fire extinguisher is not readily available, which of the listed fire extinguishers would be best suited to combat a small electrical fire in a switchboard?()ADry chemicalBHalonCLow velocity fogDSteam

单选题Which application would be suited for UDP traffic?()AWeb browsingBdownloading a programCstreaming television showsDon-line shopping

单选题The network administrator would like to generate synthetic traffic using the Service AssuranceAgent contained in Cisco IOS. Which CiscoWorks network management application will be used toreport the latency and availability for configured traffic operations on an end-to-end and hop-by-hop (router-to router) basis?()A nGenius Real-Time MonitorB CiscoViewC Device Fault ManagerD Internetwork Performance Monitor

单选题Which statement is true about the comparison of voice traffic with video traffic?()A Video conferencing traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.B Latency requirements are less stringent for video traffic than for voice traffic.C Video traffic is less sensitive to dropped packets than for voice traffic.D Video traffic requires the retransmission capabilities of TCP whereas voice uses UDP.E Voice traffic tends to be much more bursty in nature and is more prone to have an impact on other traffic flows.F Voice traffic requires the retransmission capabilities of TCP whereas video uses UDP.

单选题The network administrator would like to generate synthetic traffic using the Service Assurance Agent contained in Cisco IOS. Which CiscoWorks network management application will be used to report the latency and availability for configured traffic operations on an end-to-end and hop-byhop (router-to-router) basis?()AnGenius Real-Time MonitorBCiscoViewCDevice Fault ManagerDInternetwork Performance Monitor

单选题What is meant by the term "firewall sandwich"?()Amultiple layers of firewallingBa method of operating firewalls from multiple vendorsCfirewall connections in either an active or standby stateDan architecture in which all traffic between firewalls goes through application-specific serversEan architecture in which all traffic between firewalls goes through application-specific gateways